Skip to main content
main-content
Top

Journal

Peer-to-Peer Networking and Applications

Peer-to-Peer Networking and Applications 1/2020

Issue 1/2020

Table of Contents ( 27 Articles )

07-01-2019 | Issue 1/2020

Resource allocation in two-tier small-cell networks with energy consumption constraints

Libo Jiao, Hao Yin, Dongchao Guo, Haojun Huang, Qin Gao

04-01-2019 | Issue 1/2020

Emergency-level-based healthcare information offloading over fog network

Cong Zhang, Hsin-Hung Cho, Chi-Yuan Chen

08-01-2019 | Issue 1/2020

RELOAD/CoAP architecture for the federation of wireless sensor networks

L. Rodrigues, J. Guerreiro, N. Correia

14-01-2019 | Issue 1/2020

FDFA: A fog computing assisted distributed analytics and detecting system for family activities

Fei Gu, Jianwei Niu, Xin Jin, Shui Yu

16-01-2019 | Issue 1/2020

A provably secure aggregate authentication scheme for unmanned aerial vehicle cluster networks

Wang Hong, Li Jianhua, Lai Chengzhe, Wang Zhe

07-12-2018 | Issue 1/2020

A software defined caching framework based on user access behavior analysis for transparent computing server

Weimin Li, Bin Wang, Jinfang Sheng, Xiangyu Hou, Lin Chen, Jiaguang Liu

31-01-2019 | Issue 1/2020

Mobile user authentication protocol with privacy preserving for roaming service in GLOMONET

R. Madhusudhan, Shashidhara R.

01-02-2019 | Issue 1/2020

Task offloading in mobile fog computing by classification and regression tree

Dadmehr Rahbari, Mohsen Nickray

11-02-2019 | Issue 1/2020

Efficient combination policies for diffusion adaptive networks

Jie Wang, Fei Dai, Jie Yang, Guan Gui

16-02-2019 | Issue 1/2020 Open Access

P2P matchmaking solution for online games

Michał Boroń, Jerzy Brzeziński, Anna Kobusińska

21-02-2019 | Issue 1/2020

Performance Modeling of Linux Network System with Open vSwitch

Runkai Yang, Xiaolin Chang, Jelena Mišić, Vojislav B. Mišić

28-03-2019 | Issue 1/2020

Fog-assisted secure healthcare data aggregation scheme in IoT-enabled WSN

Ata Ullah, Ghawar Said, Muhammad Sher, Huansheng Ning

28-03-2019 | Issue 1/2020

TrueTrust: a feedback-based trust management model without filtering feedbacks in P2P networks

Xianfu Meng, Ge Zhang

25-04-2019 | Issue 1/2020

An overlay management strategy to improve QoS in CDN-P2P live streaming systems

Shilpa Budhkar, Venkatesh Tamarapalli

30-04-2019 | Issue 1/2020

Multi-keyword ranked searchable encryption scheme with access control for cloud storage

Maryam Zarezadeh, Hamid Mala, Maede Ashouri-Talouki

08-05-2019 | Issue 1/2020

Energy efficient technique for P2P multisource video streaming in mobile ad hoc networks to improve QoE

Muhammad Salman Raheel, Raad Raad

17-05-2019 | Issue 1/2020

Topological influence on optimality of Tit-for-Tat based P2P content distribution

Masahiro Sasabe

04-06-2019 | Issue 1/2020

An energy efficient data transmission approach for low-duty-cycle wireless sensor networks

Jian Wu, Zhigang Chen, Jia Wu, Xiao Liu, Genghua Yu, Yedong Zhao

17-06-2019 | Issue 1/2020

An effective positive transmission routing algorithm based on social relationships in opportunistic social networks

Peng Zheng, Hongxiao Fei, Yeqing Yan

20-06-2019 | Issue 1/2020

A parallel optimization for energy and robustness of file distribution services

Dongchao Ma, Guangxing Han, Hongchao Li, Li Ma, Chengan Zhao

29-07-2019 | Issue 1/2020

An approach by adopting multi-objective clustering and data collection along with node sleep scheduling for energy efficient and delay aware WSN

B. Guruprakash, C. Balasubramanian, R. Sukumar

05-08-2019 | Issue 1/2020

Assessment of coverage quality of sensor networks for IoT applications

Amr Elsaadany, Khalid Khalil

14-08-2019 | Issue 1/2020

Resilient against spoofing in 6LoWPAN networks by temporary-private IPv6 addresses

Monali Mavani, Krishna Asawa

14-08-2019 | Issue 1/2020

A hierarchical identity-based security for delay tolerant networks using lattice-based cryptography

Gaurav Srivastava, Richa Agrawal, Kunwar Singh, Rajeev Tripathi, Kshirasagar Naik

19-08-2019 | Issue 1/2020

A balanced strategy to improve data invulnerability in structured P2P system

Xiaogang Qi, Min Qiang, Lifang Liu

20-08-2019 | Issue 1/2020

EASPSC: Efficient authentication of SignRecryption protocol using shareable clouds in VANET groups

Sneha Kanchan, Garima Singh, Narendra S. Chaudhari

30-08-2019 | Issue 1/2020

Achieve privacy-preserving simplicial depth query over collaborative cloud servers

Hassan Mahdikhani, Rasoul Shahsavarifar, Rongxing Lu, David Bremner

Current Publications

Premium Partner

    Image Credits