Skip to main content

Peer-to-Peer Networking and Applications

Ausgabe 4/2021

Inhalt (57 Artikel)

Enabling privacy-preserving multi-level attribute based medical service recommendation in eHealthcare systems

Chang Xu, Jiachen Wang, Liehuang Zhu, Kashif Sharif, Chuan Zhang, Can Zhang

Correction

Correction to: A digital rights management system based on a scalable blockchain

Abba Garba, Ashutosh Dhar Dwivedi, Mohsin Kamal, Gautam Srivastava, Muhammad Tariq, M. Anwar Hasan, Zhong Chen

Energy efficient and link reliable routing (E2LR) scheme for underwater sensor networks

Moeenuddin Tariq, Muhammad Ayaz, Fazli Subhan, M. Zahid Abbas

P2P mobility management for seamless handover using D2D communication in B5G wireless technology

Shubhanshi Singh, Drishti Kedia, Neha Rastogi, T. Velmurugan, P. Prakasam

A self-localization range free protocol for wireless sensor networks

Souhila Silmi, Zouina Doukha, Samira Moussaoui

Anonymous and Traceable Authentication for Securing Data Sharing in Parking Edge Computing

Chunhai Li, Xiaohuan Li, Yujue Wang, Yong Ding, Feng Zhao

Efficient and privacy-preserving range-max query in fog-based agricultural IoT

Min Zhou, Yandong Zheng, Yunguo Guan, Limin Peng, Rongxing Lu

MASK: Efficient and privacy-preserving m-tree based biometric identification over cloud

Xiaopeng Yang, Hui Zhu, Fengwei Wang, Songnian Zhang, Rongxing Lu, Hui Li

RETRACTED ARTICLE: SPAHN novel approach for PL-AG gateway discovery for internet connectivity

K. Kannan, P. Sivaranjani, S. Sathish Kumar, M. Nalini, V. R. Balaji, P. Sanjeevi

MDRP: Message dissemination with re-route planning method for emergency vehicle information exchange

R. P. Meenaakshi Sundhari, L. Murali, S. Baskar, P. Mohamed Shakeel

CAN bus network design of bifurcated power electric tractor

Liu Mengnan, Han Bing, Xu Liyou, Li Yanying

Privacy preserving E-voting cloud system based on ID based encryption

Achyut Shankar, P. Pandiaraja, K. Sumathi, Thompson Stephan, Pavika Sharma

High utility itemset mining using path encoding and constrained subset generation

Vamsinath Javangula, Suvarna Vani Koneru, Haritha Dasari

FAST: Fast Accessing Scheme for data Transmission in cloud computing

Suyel Namasudra, Rupak Chakraborty, Seifedine Kadry, Gunasekaran Manogaran, Bharat S. Rawal

A trust infrastructure based authentication method for clustered vehicular ad hoc networks

Fatemehsadat Mirsadeghi, Marjan Kuchaki Rafsanjani, Brij B. Gupta

Original Paper

Analysis of intrusion detection in cyber attacks using DEEP learning neural networks

Parasuraman Kumar, A. Anbarasa Kumar, C. Sahayakingsly, A. Udayakumar