Skip to main content


Peer-to-Peer Networking and Applications

Peer-to-Peer Networking and Applications 1/2020

Ausgabe 1/2020

Inhaltsverzeichnis ( 27 Artikel )

07.01.2019 | Ausgabe 1/2020

Resource allocation in two-tier small-cell networks with energy consumption constraints

Libo Jiao, Hao Yin, Dongchao Guo, Haojun Huang, Qin Gao

04.01.2019 | Ausgabe 1/2020

Emergency-level-based healthcare information offloading over fog network

Cong Zhang, Hsin-Hung Cho, Chi-Yuan Chen

08.01.2019 | Ausgabe 1/2020

RELOAD/CoAP architecture for the federation of wireless sensor networks

L. Rodrigues, J. Guerreiro, N. Correia

14.01.2019 | Ausgabe 1/2020

FDFA: A fog computing assisted distributed analytics and detecting system for family activities

Fei Gu, Jianwei Niu, Xin Jin, Shui Yu

16.01.2019 | Ausgabe 1/2020

A provably secure aggregate authentication scheme for unmanned aerial vehicle cluster networks

Wang Hong, Li Jianhua, Lai Chengzhe, Wang Zhe

07.12.2018 | Ausgabe 1/2020

A software defined caching framework based on user access behavior analysis for transparent computing server

Weimin Li, Bin Wang, Jinfang Sheng, Xiangyu Hou, Lin Chen, Jiaguang Liu

31.01.2019 | Ausgabe 1/2020

Mobile user authentication protocol with privacy preserving for roaming service in GLOMONET

R. Madhusudhan, Shashidhara R.

01.02.2019 | Ausgabe 1/2020

Task offloading in mobile fog computing by classification and regression tree

Dadmehr Rahbari, Mohsen Nickray

11.02.2019 | Ausgabe 1/2020

Efficient combination policies for diffusion adaptive networks

Jie Wang, Fei Dai, Jie Yang, Guan Gui

16.02.2019 | Ausgabe 1/2020 Open Access

P2P matchmaking solution for online games

Michał Boroń, Jerzy Brzeziński, Anna Kobusińska

21.02.2019 | Ausgabe 1/2020

Performance Modeling of Linux Network System with Open vSwitch

Runkai Yang, Xiaolin Chang, Jelena Mišić, Vojislav B. Mišić

28.03.2019 | Ausgabe 1/2020

Fog-assisted secure healthcare data aggregation scheme in IoT-enabled WSN

Ata Ullah, Ghawar Said, Muhammad Sher, Huansheng Ning

28.03.2019 | Ausgabe 1/2020

TrueTrust: a feedback-based trust management model without filtering feedbacks in P2P networks

Xianfu Meng, Ge Zhang

25.04.2019 | Ausgabe 1/2020

An overlay management strategy to improve QoS in CDN-P2P live streaming systems

Shilpa Budhkar, Venkatesh Tamarapalli

30.04.2019 | Ausgabe 1/2020

Multi-keyword ranked searchable encryption scheme with access control for cloud storage

Maryam Zarezadeh, Hamid Mala, Maede Ashouri-Talouki

08.05.2019 | Ausgabe 1/2020

Energy efficient technique for P2P multisource video streaming in mobile ad hoc networks to improve QoE

Muhammad Salman Raheel, Raad Raad

17.05.2019 | Ausgabe 1/2020

Topological influence on optimality of Tit-for-Tat based P2P content distribution

Masahiro Sasabe

04.06.2019 | Ausgabe 1/2020

An energy efficient data transmission approach for low-duty-cycle wireless sensor networks

Jian Wu, Zhigang Chen, Jia Wu, Xiao Liu, Genghua Yu, Yedong Zhao

17.06.2019 | Ausgabe 1/2020

An effective positive transmission routing algorithm based on social relationships in opportunistic social networks

Peng Zheng, Hongxiao Fei, Yeqing Yan

20.06.2019 | Ausgabe 1/2020

A parallel optimization for energy and robustness of file distribution services

Dongchao Ma, Guangxing Han, Hongchao Li, Li Ma, Chengan Zhao

29.07.2019 | Ausgabe 1/2020

An approach by adopting multi-objective clustering and data collection along with node sleep scheduling for energy efficient and delay aware WSN

B. Guruprakash, C. Balasubramanian, R. Sukumar

05.08.2019 | Ausgabe 1/2020

Assessment of coverage quality of sensor networks for IoT applications

Amr Elsaadany, Khalid Khalil

14.08.2019 | Ausgabe 1/2020

Resilient against spoofing in 6LoWPAN networks by temporary-private IPv6 addresses

Monali Mavani, Krishna Asawa

14.08.2019 | Ausgabe 1/2020

A hierarchical identity-based security for delay tolerant networks using lattice-based cryptography

Gaurav Srivastava, Richa Agrawal, Kunwar Singh, Rajeev Tripathi, Kshirasagar Naik

19.08.2019 | Ausgabe 1/2020

A balanced strategy to improve data invulnerability in structured P2P system

Xiaogang Qi, Min Qiang, Lifang Liu

20.08.2019 | Ausgabe 1/2020

EASPSC: Efficient authentication of SignRecryption protocol using shareable clouds in VANET groups

Sneha Kanchan, Garima Singh, Narendra S. Chaudhari

30.08.2019 | Ausgabe 1/2020

Achieve privacy-preserving simplicial depth query over collaborative cloud servers

Hassan Mahdikhani, Rasoul Shahsavarifar, Rongxing Lu, David Bremner

Aktuelle Ausgaben

Premium Partner