Skip to main content

Peer-to-Peer Networking and Applications

Ausgabe 4/2024

Inhalt (42 Artikel)

Improving byzantine fault tolerance based on stake evaluation and consistent hashing

Guangfu Wu, Xin Lai, Daojing He, Sammy Chan, Xiaoyan Fu

Lower rounds lattice-based anonymous AKA under the seCK model for the IoT

Guanglu Wei, Kai Fan, Kuan Zhang, Haoyang Wang, Yirui Wang, Kan Yang, Hui Li, Yintang Yang

DIEET: Knowledge–Infused Event Tracking in Social Media based on Deep Learning

Jun Ge, Lei-lei Shi, Lu liu, Zi-xuan Han, Anthony Miller

An innovative privacy preservation and security framework with fog nodes in enabled vanet system using hybrid encryption techniques

M. S. Minu, P. Jona Innisai Rani, Vijaya Krishna Sonthi, G. Shankar, E Mohan, A. Rajesh

Insulator defect detection in complex scenarios based on cascaded networks with lightweight attention mechanism

Yang Ning, Li Xiang, Jing Hongyuan, Shang Xinna, Shen Ping, Chen Aidong

Smart grid security based on blockchain and smart contract

Ming Zhang, Yutong Liu, Qian Cheng, Hui Li, Dan Liao, Huiyong Li

An optimal secure and reliable certificateless proxy signature for industrial internet of things

Rafiq Ullah, Amjad Mehmood, Muhammad Altaf Khan, Carsten Maple, Jaime Lloret

Taas: Trust assessment as a service for secure communication of green edge-assisted UAV network

Qixu Wang, Peng Xiao, Xiang Li, Yunxiang Qiu, Tao Zheng, Zhiguang Qin

Service based VEINS framework for vehicular Ad-hoc network (VANET): A systematic review of state-of-the-art

Badiea Abdulkarem Mohammed, Mahmood A. Al-Shareeda, Abeer Abdullah Alsadhan, Zeyad Ghaleb Al-Mekhlafi, Amer A. Sallam, Bassam Ali Al-Qatab, Mohammad T. Alshammari, Abdulaziz M. Alayba

H-Louvain: Hierarchical Louvain-based community detection in social media data streams

Zi-xuan Han, Lei-lei Shi, Lu Liu, Liang Jiang, Wan Tang, Xiao Chen, Jing-yu Yang, Ayodeji O. Ayorinde, Nick Antonopoulos

Improving NB-IoT performance in weak coverage areas with CBSTO polar coding and LMMSE channel estimation

G Bavani, V. Prasanna Srinivasan, K. Balasubadra, Velankanni Cyril Raj

Authenticated key agreement for IoT network using HECC and CRT four co-primes

Chandan Goswami, Avishek Adhikari, Suraj Kumar Sahoo, Pinaki Sarkar

Dynamic behavioral profiling for anomaly detection in software-defined IoT networks: A machine learning approach

Senthilraja P, Kanmani Palaniappan, Brindha Duraipandi, Uma Maheswari Balasubramanian

An effective trajectory planning heuristics for UAV-assisted vessel monitoring system

Jie Zhu, Kaiyu Guo, Pengfei He, Haiping Huang, Reza Malekian, Yuzhong Sun

A privacy protection scheme for green communication combining digital steganography

Pengbiao Zhao, Bintao Wang, Zhen Qin, Yi Ding, Kim-Kwang Raymond Choo

Masked image: Visually protected image dataset privacy-preserving scheme for convolutional neural networks

Xiaoyu Kou, Fengwei Wang, Hui Zhu, Yandong Zheng, Xiaopeng Yang, Zhe Liu

Certificate-less Aggregate Signature Authentication Scheme (CLASAS) for secure and efficient data transmission in Wireless Sensor Networks (WSNs)

Pradeep Radhakrishnan, Praveen Kumar Sugumar, Preethi Ponnan, Gopirajan Punniyakotti Varadharajan

Invisible man: blockchain-enabled peer-to-peer collaborative privacy games in LBSs

Beining Zhang, Hang Shen, Tianjing Wang, Guangwei Bai