Journal Peer-to-Peer Networking and Applications Issue 4/2021 share SHARE Search insite SEARCH Table of Contents (57 Articles) 18-03-2021 Enabling privacy-preserving multi-level attribute based medical service recommendation in eHealthcare systems Chang Xu, Jiachen Wang, Liehuang Zhu, Kashif Sharif, Chuan Zhang, Can Zhang 23-03-2021 Tree-searching based trust assessment through communities in vehicular networks Zhong Li, Xueting Yang, Changjun Jiang 25-03-2021 | Correction Correction to: A digital rights management system based on a scalable blockchain Abba Garba, Ashutosh Dhar Dwivedi, Mohsin Kamal, Gautam Srivastava, Muhammad Tariq, M. Anwar Hasan, Zhong Chen 25-03-2021 Energy efficient and link reliable routing (E2LR) scheme for underwater sensor networks Moeenuddin Tariq, Muhammad Ayaz, Fazli Subhan, M. Zahid Abbas 31-03-2021 iForest: An informed resource search strategy in mobile P2P networks Shuai Zhou, Ting Zhang, Xianfu Meng 31-03-2021 Reliable scheduling and load balancing for requests in cloud-fog computing Fayez Alqahtani, Mohammed Amoon, Aida A. Nasr 01-04-2021 A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks Efat Yousefpoor, Hamid Barati, Ali Barati 08-04-2021 A Grey-Wolf based Optimized Clustering approach to improve QoS in wireless sensor networks for IoT applications Kavita Jaiswal, Veena Anand 16-04-2021 Energy efficient data correlation aware opportunistic routing protocol for wireless sensor networks Xu Qin, Guanglun Huang, Baoxian Zhang, Cheng Li 16-04-2021 A probability based energy competent cluster based secured ch selection routing EC2SR protocol for smart dust D. Rajesh, D. Giji Kiruba 17-04-2021 P2P mobility management for seamless handover using D2D communication in B5G wireless technology Shubhanshi Singh, Drishti Kedia, Neha Rastogi, T. Velmurugan, P. Prakasam 19-04-2021 Radial kernelized regressive merkle–damgård cryptographic hash blockchain for secure data transmission with IoT sensor node Yuvaraj N, Mohanraj P 20-04-2021 A trust-based privacy-preserving friend matching scheme in social Internet of Vehicles Chengzhe Lai, Yangyang Du, Qili Guo, Dong Zheng 21-04-2021 Traffic sign detection and recognition using RGSM and a novel feature extraction method M. Sudha, Dr.V.P. Galdis pushparathi 01-05-2021 Delay - aware bandwidth estimation and intelligent video transcoder in mobile cloud S.P. Tamizhselvi, Vijayalakshmi Muthuswamy 02-05-2021 A self-localization range free protocol for wireless sensor networks Souhila Silmi, Zouina Doukha, Samira Moussaoui 08-05-2021 Hybrid fuzzy logic and artificial Flora optimization algorithm-based two tier cluster head selection for improving energy efficiency in WSNs Ramakrishnan Anandkumar 08-05-2021 An energy aware modified PAM clustering with cluster head modulation in Mobile cloud sensor environment S. Jeen Shene, W. R. Sam Emmanuel 11-05-2021 Anonymous and Traceable Authentication for Securing Data Sharing in Parking Edge Computing Chunhai Li, Xiaohuan Li, Yujue Wang, Yong Ding, Feng Zhao 14-05-2021 Joint optimization for throughput maximization in underwater acoustic networks with energy harvesting Zhixin Liu, Xiangyun Meng, Yazhou Yuan, Yi Yang, Kit Yan Chan 17-05-2021 Analysis of minimum distribution time of tit-for-tat-based P2P file distribution: Linear programming based approach Masahiro Sasabe 23-05-2021 Energy and delay-ware massive task scheduling in fog-cloud computing system Mengying Jia, Jie Zhu, Haiping Huang 25-05-2021 Efficient and privacy-preserving range-max query in fog-based agricultural IoT Min Zhou, Yandong Zheng, Yunguo Guan, Limin Peng, Rongxing Lu 25-05-2021 MASK: Efficient and privacy-preserving m-tree based biometric identification over cloud Xiaopeng Yang, Hui Zhu, Fengwei Wang, Songnian Zhang, Rongxing Lu, Hui Li 25-05-2021 A critical analysis of RPL objective functions in internet of things paradigm Neeti Gupta, Anuradha Pughat, Vidushi Sharma 27-05-2021 Adaptive cost and energy aware secure peer-to-peer computational offloading in the edge-cloud enabled healthcare system Ramaprabha Jayaram, S. Prabakaran 03-06-2021 A deep learning-based constrained intelligent routing method Zheheng Rao, Yanyan Xu, Shaoming Pan 03-06-2021 Identity based two-party authenticated key agreement scheme for vehicular ad hoc networks Lunzhi Deng, Jianxin Shao, Zhenyu Hu 03-06-2021 Joint offloading and energy optimization for wireless powered mobile edge computing under nonlinear EH Model Hua Shi, Ronghua Luo, Guan Gui 07-06-2021 One radish, One hole: Specific adversarial training for enhancing neural network’s robustness Yun Zhang, Hongwei Li, Guowen Xu, Shuai Yuan, Xiaoming Huang 26-05-2020 RETRACTED ARTICLE: SPAHN novel approach for PL-AG gateway discovery for internet connectivity K. Kannan, P. Sivaranjani, S. Sathish Kumar, M. Nalini, V. R. Balaji, P. Sanjeevi 01-06-2020 MDRP: Message dissemination with re-route planning method for emergency vehicle information exchange R. P. Meenaakshi Sundhari, L. Murali, S. Baskar, P. Mohamed Shakeel 05-06-2020 Scalable aggregation plan (SAP) for portable network in a box (NIB) architecture Torki Altameem, Ayman Altameem 08-06-2020 CAN bus network design of bifurcated power electric tractor Liu Mengnan, Han Bing, Xu Liyou, Li Yanying 09-06-2020 Transmission adaptive mode selection (TAMS) method for internet of things device energy management Mohammed Al-Ma’aitah, Ayed Alwadain, Aldosary Saad 20-06-2020 Analyzing and eliminating phishing threats in IoT, network and other Web applications using iterative intersection K. Nirmal, B. Janet, R. Kumar 21-06-2020 SRAF: Scalable Resource Allocation Framework using Machine Learning in user-Centric Internet of Things Zafer Al-Makhadmeh, Amr Tolba 22-06-2020 Effective power allocation and distribution for 6 g – network in a box enabled peer to peer wireless communication networks V. K. Gnanavel, A. Srinivasan 17-07-2020 A novel clustering technique to stop congestion occur vehicular ad-hoc networks using node density based on received signal strength R. Regin, T. Menakadevi 26-07-2020 A novel predicate based access control scheme for cloud environment using open stack swift storage Chunduru Anilkumar, Sumathy Subramanian 31-07-2020 A framework for the identification of suspicious packets to detect anti-forensic attacks in the cloud environment Deevi Radha Rani, G. Geethakumari 07-08-2020 Privacy preserving E-voting cloud system based on ID based encryption Achyut Shankar, P. Pandiaraja, K. Sumathi, Thompson Stephan, Pavika Sharma 22-08-2020 High utility itemset mining using path encoding and constrained subset generation Vamsinath Javangula, Suvarna Vani Koneru, Haritha Dasari 26-08-2020 Sparse auto encoder driven support vector regression based deep learning model for predicting network intrusions D. Preethi, Neelu Khare 28-08-2020 FAST: Fast Accessing Scheme for data Transmission in cloud computing Suyel Namasudra, Rupak Chakraborty, Seifedine Kadry, Gunasekaran Manogaran, Bharat S. Rawal 28-08-2020 An efficient secure data deduplication method using radix trie with bloom filter (SDD-RT-BF) in cloud environment Silambarasan Elkana Ebinazer, Nickolas Savarimuthu, Mary Saira Bhanu S 29-08-2020 A novel energy-efficient data aggregation protocol for cognitive radio based wireless multimedia networks C. Rajesh Babu, B. Amutha 07-09-2020 PriPresent: an embedded prime LightWeight block cipher for smart devices M. Girija, P. Manickam, M. Ramaswami 07-09-2020 An optimistic technique to detect Cache based Side Channel attacks in Cloud G. Sangeetha, G. Sumathi 11-09-2020 Dynamic intelligent resource allocation for emergency situations Chang Zhi-xian 15-09-2020 Research on wireless sensor location technology for biologic signal measuring based on intelligent bionic algorithm Binbin Jiang 19-09-2020 Intelligent physical systems for strategic planning and management of enterprise information Changyou Ye, Xiaowei Song, G. N. Vivekananda, V. Savitha 30-09-2020 Application of big data optimized clustering algorithm in cloud computing environment in traffic accident forecast Zhun Tian, Shengrui Zhang 24-10-2020 Epidemic and transmission priority based data dissemination model in vehichular adhoc networks (VANETs) D. N. S. Ravi Kumar, S. Barani 24-10-2020 A trust infrastructure based authentication method for clustered vehicular ad hoc networks Fatemehsadat Mirsadeghi, Marjan Kuchaki Rafsanjani, Brij B. Gupta 25-10-2020 A machine learning-assisted data aggregation and offloading system for cloud–IoT communication Osama Alfarraj 31-10-2020 | Original Paper Analysis of intrusion detection in cyber attacks using DEEP learning neural networks Parasuraman Kumar, A. Anbarasa Kumar, C. Sahayakingsly, A. Udayakumar