Skip to main content
Top

Journal

Peer-to-Peer Networking and Applications 4/2021
Peer-to-Peer Networking and Applications

Issue 4/2021

share
SHARE
insite
SEARCH

Table of Contents (57 Articles)

18-03-2021

Enabling privacy-preserving multi-level attribute based medical service recommendation in eHealthcare systems
Chang Xu, Jiachen Wang, Liehuang Zhu, Kashif Sharif, Chuan Zhang, Can Zhang

23-03-2021

Tree-searching based trust assessment through communities in vehicular networks
Zhong Li, Xueting Yang, Changjun Jiang

25-03-2021 | Correction

Correction to: A digital rights management system based on a scalable blockchain
Abba Garba, Ashutosh Dhar Dwivedi, Mohsin Kamal, Gautam Srivastava, Muhammad Tariq, M. Anwar Hasan, Zhong Chen

25-03-2021

Energy efficient and link reliable routing (E2LR) scheme for underwater sensor networks
Moeenuddin Tariq, Muhammad Ayaz, Fazli Subhan, M. Zahid Abbas

31-03-2021

iForest: An informed resource search strategy in mobile P2P networks
Shuai Zhou, Ting Zhang, Xianfu Meng

31-03-2021

Reliable scheduling and load balancing for requests in cloud-fog computing
Fayez Alqahtani, Mohammed Amoon, Aida A. Nasr

01-04-2021

A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks
Efat Yousefpoor, Hamid Barati, Ali Barati

08-04-2021

A Grey-Wolf based Optimized Clustering approach to improve QoS in wireless sensor networks for IoT applications
Kavita Jaiswal, Veena Anand

16-04-2021

Energy efficient data correlation aware opportunistic routing protocol for wireless sensor networks
Xu Qin, Guanglun Huang, Baoxian Zhang, Cheng Li

16-04-2021

A probability based energy competent cluster based secured ch selection routing EC2SR protocol for smart dust
D. Rajesh, D. Giji Kiruba

17-04-2021

P2P mobility management for seamless handover using D2D communication in B5G wireless technology
Shubhanshi Singh, Drishti Kedia, Neha Rastogi, T. Velmurugan, P. Prakasam

19-04-2021

Radial kernelized regressive merkle–damgård cryptographic hash blockchain for secure data transmission with IoT sensor node
Yuvaraj N, Mohanraj P

20-04-2021

A trust-based privacy-preserving friend matching scheme in social Internet of Vehicles
Chengzhe Lai, Yangyang Du, Qili Guo, Dong Zheng

21-04-2021

Traffic sign detection and recognition using RGSM and a novel feature extraction method
M. Sudha, Dr.V.P. Galdis pushparathi

01-05-2021

Delay - aware bandwidth estimation and intelligent video transcoder in mobile cloud
S.P. Tamizhselvi, Vijayalakshmi Muthuswamy

02-05-2021

A self-localization range free protocol for wireless sensor networks
Souhila Silmi, Zouina Doukha, Samira Moussaoui

08-05-2021

Hybrid fuzzy logic and artificial Flora optimization algorithm-based two tier cluster head selection for improving energy efficiency in WSNs
Ramakrishnan Anandkumar

08-05-2021

An energy aware modified PAM clustering with cluster head modulation in Mobile cloud sensor environment
S. Jeen Shene, W. R. Sam Emmanuel

11-05-2021

Anonymous and Traceable Authentication for Securing Data Sharing in Parking Edge Computing
Chunhai Li, Xiaohuan Li, Yujue Wang, Yong Ding, Feng Zhao

14-05-2021

Joint optimization for throughput maximization in underwater acoustic networks with energy harvesting
Zhixin Liu, Xiangyun Meng, Yazhou Yuan, Yi Yang, Kit Yan Chan

17-05-2021

Analysis of minimum distribution time of tit-for-tat-based P2P file distribution: Linear programming based approach
Masahiro Sasabe

23-05-2021

Energy and delay-ware massive task scheduling in fog-cloud computing system
Mengying Jia, Jie Zhu, Haiping Huang

25-05-2021

Efficient and privacy-preserving range-max query in fog-based agricultural IoT
Min Zhou, Yandong Zheng, Yunguo Guan, Limin Peng, Rongxing Lu

25-05-2021

MASK: Efficient and privacy-preserving m-tree based biometric identification over cloud
Xiaopeng Yang, Hui Zhu, Fengwei Wang, Songnian Zhang, Rongxing Lu, Hui Li

25-05-2021

A critical analysis of RPL objective functions in internet of things paradigm
Neeti Gupta, Anuradha Pughat, Vidushi Sharma

27-05-2021

Adaptive cost and energy aware secure peer-to-peer computational offloading in the edge-cloud enabled healthcare system
Ramaprabha Jayaram, S. Prabakaran

03-06-2021

A deep learning-based constrained intelligent routing method
Zheheng Rao, Yanyan Xu, Shaoming Pan

03-06-2021

Identity based two-party authenticated key agreement scheme for vehicular ad hoc networks
Lunzhi Deng, Jianxin Shao, Zhenyu Hu

03-06-2021

Joint offloading and energy optimization for wireless powered mobile edge computing under nonlinear EH Model
Hua Shi, Ronghua Luo, Guan Gui

07-06-2021

One radish, One hole: Specific adversarial training for enhancing neural network’s robustness
Yun Zhang, Hongwei Li, Guowen Xu, Shuai Yuan, Xiaoming Huang

26-05-2020

RETRACTED ARTICLE: SPAHN novel approach for PL-AG gateway discovery for internet connectivity
K. Kannan, P. Sivaranjani, S. Sathish Kumar, M. Nalini, V. R. Balaji, P. Sanjeevi

01-06-2020

MDRP: Message dissemination with re-route planning method for emergency vehicle information exchange
R. P. Meenaakshi Sundhari, L. Murali, S. Baskar, P. Mohamed Shakeel

05-06-2020

Scalable aggregation plan (SAP) for portable network in a box (NIB) architecture
Torki Altameem, Ayman Altameem

08-06-2020

CAN bus network design of bifurcated power electric tractor
Liu Mengnan, Han Bing, Xu Liyou, Li Yanying

09-06-2020

Transmission adaptive mode selection (TAMS) method for internet of things device energy management
Mohammed Al-Ma’aitah, Ayed Alwadain, Aldosary Saad

20-06-2020

Analyzing and eliminating phishing threats in IoT, network and other Web applications using iterative intersection
K. Nirmal, B. Janet, R. Kumar

21-06-2020

SRAF: Scalable Resource Allocation Framework using Machine Learning in user-Centric Internet of Things
Zafer Al-Makhadmeh, Amr Tolba

22-06-2020

Effective power allocation and distribution for 6 g – network in a box enabled peer to peer wireless communication networks
V. K. Gnanavel, A. Srinivasan

17-07-2020

A novel clustering technique to stop congestion occur vehicular ad-hoc networks using node density based on received signal strength
R. Regin, T. Menakadevi

26-07-2020

A novel predicate based access control scheme for cloud environment using open stack swift storage
Chunduru Anilkumar, Sumathy Subramanian

31-07-2020

A framework for the identification of suspicious packets to detect anti-forensic attacks in the cloud environment
Deevi Radha Rani, G. Geethakumari

07-08-2020

Privacy preserving E-voting cloud system based on ID based encryption
Achyut Shankar, P. Pandiaraja, K. Sumathi, Thompson Stephan, Pavika Sharma

22-08-2020

High utility itemset mining using path encoding and constrained subset generation
Vamsinath Javangula, Suvarna Vani Koneru, Haritha Dasari

26-08-2020

Sparse auto encoder driven support vector regression based deep learning model for predicting network intrusions
D. Preethi, Neelu Khare

28-08-2020

FAST: Fast Accessing Scheme for data Transmission in cloud computing
Suyel Namasudra, Rupak Chakraborty, Seifedine Kadry, Gunasekaran Manogaran, Bharat S. Rawal

28-08-2020

An efficient secure data deduplication method using radix trie with bloom filter (SDD-RT-BF) in cloud environment
Silambarasan Elkana Ebinazer, Nickolas Savarimuthu, Mary Saira Bhanu S

29-08-2020

A novel energy-efficient data aggregation protocol for cognitive radio based wireless multimedia networks
C. Rajesh Babu, B. Amutha

07-09-2020

PriPresent: an embedded prime LightWeight block cipher for smart devices
M. Girija, P. Manickam, M. Ramaswami

07-09-2020

An optimistic technique to detect Cache based Side Channel attacks in Cloud
G. Sangeetha, G. Sumathi

11-09-2020

Dynamic intelligent resource allocation for emergency situations
Chang Zhi-xian

15-09-2020

Research on wireless sensor location technology for biologic signal measuring based on intelligent bionic algorithm
Binbin Jiang

19-09-2020

Intelligent physical systems for strategic planning and management of enterprise information
Changyou Ye, Xiaowei Song, G. N. Vivekananda, V. Savitha

30-09-2020

Application of big data optimized clustering algorithm in cloud computing environment in traffic accident forecast
Zhun Tian, Shengrui Zhang

24-10-2020

Epidemic and transmission priority based data dissemination model in vehichular adhoc networks (VANETs)
D. N. S. Ravi Kumar, S. Barani

24-10-2020

A trust infrastructure based authentication method for clustered vehicular ad hoc networks
Fatemehsadat Mirsadeghi, Marjan Kuchaki Rafsanjani, Brij B. Gupta

25-10-2020

A machine learning-assisted data aggregation and offloading system for cloud–IoT communication
Osama Alfarraj

31-10-2020 | Original Paper

Analysis of intrusion detection in cyber attacks using DEEP learning neural networks
Parasuraman Kumar, A. Anbarasa Kumar, C. Sahayakingsly, A. Udayakumar

Current Publications

Premium Partner