Skip to main content


Peer-to-Peer Networking and Applications

Peer-to-Peer Networking and Applications 4/2021

Issue 4/2021

Table of Contents ( 57 Articles )

18-03-2021 | Issue 4/2021

Enabling privacy-preserving multi-level attribute based medical service recommendation in eHealthcare systems

Chang Xu, Jiachen Wang, Liehuang Zhu, Kashif Sharif, Chuan Zhang, Can Zhang

23-03-2021 | Issue 4/2021

Tree-searching based trust assessment through communities in vehicular networks

Zhong Li, Xueting Yang, Changjun Jiang

25-03-2021 | Correction | Issue 4/2021

Correction to: A digital rights management system based on a scalable blockchain

Abba Garba, Ashutosh Dhar Dwivedi, Mohsin Kamal, Gautam Srivastava, Muhammad Tariq, M. Anwar Hasan, Zhong Chen

25-03-2021 | Issue 4/2021

Energy efficient and link reliable routing (E2LR) scheme for underwater sensor networks

Moeenuddin Tariq, Muhammad Ayaz, Fazli Subhan, M. Zahid Abbas

31-03-2021 | Issue 4/2021

iForest: An informed resource search strategy in mobile P2P networks

Shuai Zhou, Ting Zhang, Xianfu Meng

31-03-2021 | Issue 4/2021

Reliable scheduling and load balancing for requests in cloud-fog computing

Fayez Alqahtani, Mohammed Amoon, Aida A. Nasr

01-04-2021 | Issue 4/2021

A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks

Efat Yousefpoor, Hamid Barati, Ali Barati

08-04-2021 | Issue 4/2021

A Grey-Wolf based Optimized Clustering approach to improve QoS in wireless sensor networks for IoT applications

Kavita Jaiswal, Veena Anand

16-04-2021 | Issue 4/2021

Energy efficient data correlation aware opportunistic routing protocol for wireless sensor networks

Xu Qin, Guanglun Huang, Baoxian Zhang, Cheng Li

16-04-2021 | Issue 4/2021

A probability based energy competent cluster based secured ch selection routing EC2SR protocol for smart dust

D. Rajesh, D. Giji Kiruba

17-04-2021 | Issue 4/2021

P2P mobility management for seamless handover using D2D communication in B5G wireless technology

Shubhanshi Singh, Drishti Kedia, Neha Rastogi, T. Velmurugan, P. Prakasam

19-04-2021 | Issue 4/2021

Radial kernelized regressive merkle–damgård cryptographic hash blockchain for secure data transmission with IoT sensor node

Yuvaraj N, Mohanraj P

20-04-2021 | Issue 4/2021

A trust-based privacy-preserving friend matching scheme in social Internet of Vehicles

Chengzhe Lai, Yangyang Du, Qili Guo, Dong Zheng

21-04-2021 | Issue 4/2021

Traffic sign detection and recognition using RGSM and a novel feature extraction method

M. Sudha, Dr.V.P. Galdis pushparathi

01-05-2021 | Issue 4/2021

Delay - aware bandwidth estimation and intelligent video transcoder in mobile cloud

S.P. Tamizhselvi, Vijayalakshmi Muthuswamy

02-05-2021 | Issue 4/2021

A self-localization range free protocol for wireless sensor networks

Souhila Silmi, Zouina Doukha, Samira Moussaoui

08-05-2021 | Issue 4/2021

Hybrid fuzzy logic and artificial Flora optimization algorithm-based two tier cluster head selection for improving energy efficiency in WSNs

Ramakrishnan Anandkumar

08-05-2021 | Issue 4/2021

An energy aware modified PAM clustering with cluster head modulation in Mobile cloud sensor environment

S. Jeen Shene, W. R. Sam Emmanuel

11-05-2021 | Issue 4/2021

Anonymous and Traceable Authentication for Securing Data Sharing in Parking Edge Computing

Chunhai Li, Xiaohuan Li, Yujue Wang, Yong Ding, Feng Zhao

14-05-2021 | Issue 4/2021

Joint optimization for throughput maximization in underwater acoustic networks with energy harvesting

Zhixin Liu, Xiangyun Meng, Yazhou Yuan, Yi Yang, Kit Yan Chan

17-05-2021 | Issue 4/2021

Analysis of minimum distribution time of tit-for-tat-based P2P file distribution: Linear programming based approach

Masahiro Sasabe

23-05-2021 | Issue 4/2021

Energy and delay-ware massive task scheduling in fog-cloud computing system

Mengying Jia, Jie Zhu, Haiping Huang

25-05-2021 | Issue 4/2021

Efficient and privacy-preserving range-max query in fog-based agricultural IoT

Min Zhou, Yandong Zheng, Yunguo Guan, Limin Peng, Rongxing Lu

25-05-2021 | Issue 4/2021

MASK: Efficient and privacy-preserving m-tree based biometric identification over cloud

Xiaopeng Yang, Hui Zhu, Fengwei Wang, Songnian Zhang, Rongxing Lu, Hui Li

25-05-2021 | Issue 4/2021

A critical analysis of RPL objective functions in internet of things paradigm

Neeti Gupta, Anuradha Pughat, Vidushi Sharma

27-05-2021 | Issue 4/2021

Adaptive cost and energy aware secure peer-to-peer computational offloading in the edge-cloud enabled healthcare system

Ramaprabha Jayaram, S. Prabakaran

03-06-2021 | Issue 4/2021

A deep learning-based constrained intelligent routing method

Zheheng Rao, Yanyan Xu, Shaoming Pan

03-06-2021 | Issue 4/2021

Identity based two-party authenticated key agreement scheme for vehicular ad hoc networks

Lunzhi Deng, Jianxin Shao, Zhenyu Hu

03-06-2021 | Issue 4/2021

Joint offloading and energy optimization for wireless powered mobile edge computing under nonlinear EH Model

Hua Shi, Ronghua Luo, Guan Gui

07-06-2021 | Issue 4/2021

One radish, One hole: Specific adversarial training for enhancing neural network’s robustness

Yun Zhang, Hongwei Li, Guowen Xu, Shuai Yuan, Xiaoming Huang

26-05-2020 | Issue 4/2021

SPAHN novel approach for PL-AG gateway discovery for internet connectivity

K. Kannan, P. Sivaranjani, S. Sathish Kumar, M. Nalini, V. R. Balaji, P. Sanjeevi

01-06-2020 | Issue 4/2021

MDRP: Message dissemination with re-route planning method for emergency vehicle information exchange

R. P. Meenaakshi Sundhari, L. Murali, S. Baskar, P. Mohamed Shakeel

05-06-2020 | Issue 4/2021

Scalable aggregation plan (SAP) for portable network in a box (NIB) architecture

Torki Altameem, Ayman Altameem

08-06-2020 | Issue 4/2021

CAN bus network design of bifurcated power electric tractor

Liu Mengnan, Han Bing, Xu Liyou, Li Yanying

09-06-2020 | Issue 4/2021

Transmission adaptive mode selection (TAMS) method for internet of things device energy management

Mohammed Al-Ma’aitah, Ayed Alwadain, Aldosary Saad

20-06-2020 | Issue 4/2021

Analyzing and eliminating phishing threats in IoT, network and other Web applications using iterative intersection

K. Nirmal, B. Janet, R. Kumar

21-06-2020 | Issue 4/2021

SRAF: Scalable Resource Allocation Framework using Machine Learning in user-Centric Internet of Things

Zafer Al-Makhadmeh, Amr Tolba

22-06-2020 | Issue 4/2021

Effective power allocation and distribution for 6 g – network in a box enabled peer to peer wireless communication networks

V. K. Gnanavel, A. Srinivasan

17-07-2020 | Issue 4/2021

A novel clustering technique to stop congestion occur vehicular ad-hoc networks using node density based on received signal strength

R. Regin, T. Menakadevi

26-07-2020 | Issue 4/2021

A novel predicate based access control scheme for cloud environment using open stack swift storage

Chunduru Anilkumar, Sumathy Subramanian

31-07-2020 | Issue 4/2021

A framework for the identification of suspicious packets to detect anti-forensic attacks in the cloud environment

Deevi Radha Rani, G. Geethakumari

07-08-2020 | Issue 4/2021

Privacy preserving E-voting cloud system based on ID based encryption

Achyut Shankar PhD, P. Pandiaraja PhD, K. Sumathi, Thompson Stephan PhD, Pavika Sharma PhD

22-08-2020 | Issue 4/2021

High utility itemset mining using path encoding and constrained subset generation

Vamsinath Javangula, Suvarna Vani Koneru, Haritha Dasari

26-08-2020 | Issue 4/2021

Sparse auto encoder driven support vector regression based deep learning model for predicting network intrusions

D. Preethi, Neelu Khare

28-08-2020 | Issue 4/2021

FAST: Fast Accessing Scheme for data Transmission in cloud computing

Suyel Namasudra, Rupak Chakraborty, Seifedine Kadry, Gunasekaran Manogaran, Bharat S. Rawal

28-08-2020 | Issue 4/2021

An efficient secure data deduplication method using radix trie with bloom filter (SDD-RT-BF) in cloud environment

Silambarasan Elkana Ebinazer, Nickolas Savarimuthu, Mary Saira Bhanu S

29-08-2020 | Issue 4/2021

A novel energy-efficient data aggregation protocol for cognitive radio based wireless multimedia networks

C. Rajesh Babu, B. Amutha

07-09-2020 | Issue 4/2021

PriPresent: an embedded prime LightWeight block cipher for smart devices

M. Girija, P. Manickam, M. Ramaswami

07-09-2020 | Issue 4/2021

An optimistic technique to detect Cache based Side Channel attacks in Cloud

G. Sangeetha, G. Sumathi

11-09-2020 | Issue 4/2021

Dynamic intelligent resource allocation for emergency situations

Chang Zhi-xian

15-09-2020 | Issue 4/2021

Research on wireless sensor location technology for biologic signal measuring based on intelligent bionic algorithm

Binbin Jiang

19-09-2020 | Issue 4/2021

Intelligent physical systems for strategic planning and management of enterprise information

Changyou Ye, Xiaowei Song, G. N. Vivekananda, V. Savitha

30-09-2020 | Issue 4/2021

Application of big data optimized clustering algorithm in cloud computing environment in traffic accident forecast

Zhun Tian, Shengrui Zhang

24-10-2020 | Issue 4/2021

Epidemic and transmission priority based data dissemination model in vehichular adhoc networks (VANETs)

D. N. S. Ravi Kumar, S. Barani

24-10-2020 | Issue 4/2021

A trust infrastructure based authentication method for clustered vehicular ad hoc networks

Fatemehsadat Mirsadeghi, Marjan Kuchaki Rafsanjani, Brij B. Gupta

25-10-2020 | Issue 4/2021

A machine learning-assisted data aggregation and offloading system for cloud–IoT communication

Osama Alfarraj

31-10-2020 | Original Paper | Issue 4/2021

Analysis of intrusion detection in cyber attacks using DEEP learning neural networks

Parasuraman Kumar, A. Anbarasa Kumar, C. Sahayakingsly, A. Udayakumar

Current Publications

Premium Partner

    Image Credits