


default search action
Peer-to-Peer Networking and Applications, Volume 16
Volume 16, Number 1, January 2023
- Sanjeev Kumar Dwivedi

, Ruhul Amin
, Satyanarayana Vollala:
Smart contract and IPFS-based trustworthy secure data storage and device authentication scheme in fog computing environment. 1-21 - Srivel Ravi

, Saravanan Matheswaran
, Uma Perumal, Shanthi Sivakumar, Srinivas Kumar Palvadi
:
Adaptive trust-based secure and optimal route selection algorithm for MANET using hybrid fuzzy optimization. 22-34 - Diksha Rangwani

, Hari Om:
4F-MAKA: Four-factor mutual authentication and key agreement protocol for internet of things. 35-56 - Volodymyr Kharchenko

, Andrii Grekhov
:
Traffic simulation and losses estimation in stratospheric drone network. 57-70 - Neng Wan

, Yating Luo, Guangping Zeng
, Xianwei Zhou:
Minimization of VANET execution time based on joint task offloading and resource allocation. 71-86 - V. C. Diniesh

, G. Murugesan:
EEM-MAC: Enhanced energy efficient mobility aware MAC protocol for mobile internet of things. 87-106 - Xiaohui Yang, Wenjie Li

, Kai Fan:
A revocable attribute-based encryption EHR sharing scheme with multiple authorities in blockchain. 107-125 - Poonam Tiwari

, Sandeep Kumar Gupta, Aruna Pathak
:
Field-clustering with sleep awake mechanism with fuzzy in wireless sensor network. 126-141 - Meng Zhao, Yong Ding

, Shijie Tang, Hai Liang, Huiyong Wang:
A blockchain-based framework for privacy-preserving and verifiable billing in smart grid. 142-155 - Mu Han, Puyi Xu, Lei Xu, Chungen Xu:

TCA-PEKS: Trusted certificateless authentication public-key encryption with keyword search scheme in cloud storage. 156-169 - Lixia Lin

, Wen'an Zhou
, Zhicheng Yang, Jianlong Liu:
Deep reinforcement learning-based task scheduling and resource allocation for NOMA-MEC in Industrial Internet of Things. 170-188 - Milad Mohseni, Fatemeh Amirghafouri, Behrouz Pourghebleh

:
CEDAR: A cluster-based energy-aware data aggregation routing protocol in the internet of things using capuchin search algorithm and fuzzy logic. 189-209 - S. Kranthi

, M. Kanchana
, M. Suneetha
:
An intelligent intrusion prediction and prevention system for software defined internet of things cloud networks. 210-225 - Jinze Li, Xiaofeng Li, He Zhao

, Bin Yu
, Tong Zhou
, Haotian Cheng, Nianzu Sheng:
MANDALA: A scalable blockchain model with mesh-and-spoke network and H-PBFT consensus algorithm. 226-244 - Xin Liu, Miao Wang, Tanyang Wang, Ruisheng Zhang

:
A blockchain assisted multi-gateway authentication scheme for IIoT based on group. 245-259 - Gaurav Tyagi

, Rahul Kumar:
Multi-factor user authentication and key agreement scheme for wireless sensor networks using Chinese remainder theorem. 260-276 - Zhaoqi Cai, Jia Wu:

Efficient content transmission algorithm based on multi-community and edge-caching in ICN-SIoT. 277-294 - Yanfei Wang, Kai Zhang

, Kejie Lu, Yun Xiong, Mi Wen:
Practical black-box adversarial attack on open-set recognition: Towards robust autonomous driving. 295-311 - Linjian Hong, Kai Zhang

, Junqing Gong, Haifeng Qian:
Blockchain-Based Fair Payment for ABE with Outsourced Decryption. 312-327 - Eiman AlNuaimi, Mariam Alsafi, Maitha Alshehhi, Mazin Debe, Khaled Salah, Ibrar Yaqoob

, M. Jamal Zemerly
, Raja Jayaraman:
Blockchain-based system for tracking and rewarding recyclable plastic waste. 328-346 - Preeti Gupta, Sachin Tripathi, Samayveer Singh, V. S. Gupta:

MPPT-EPO optimized solar energy harvesting for maximizing the WSN lifetime. 347-357 - Chang Xu

, Run Yin, Liehuang Zhu, Can Zhang, Kashif Sharif
:
Privacy-preserving and fault-tolerant aggregation of time-series data without TA. 358-367 - Erika Rosas, Orlando Andrade, Nicolas Hidalgo:

Effective communication for message prioritization in DTN for disaster scenarios. 368-382 - Ming Luo, Dashi Huang, Minrong Qiu:

An enhanced heterogeneous public key searchable encryption scheme supporting multiple keywords. 383-394 - Frédéric Guidec

, Yves Mahéo
, Camille Noûs:
Supporting conflict-free replicated data types in opportunistic networks. 395-419 - Jiamou Qi, Yepeng Guan:

Practical Byzantine fault tolerance consensus based on comprehensive reputation. 420-430 - Aditi Sharma

, Parmeet Kaur
:
Tamper-proof multitenant data storage using blockchain. 431-449 - Tania Taami, Sadoon Azizi, Ramin Yarinezhad:

An efficient route selection mechanism based on network topology in battery-powered internet of things networks. 450-465 - Heng Zhang, Jun Gu

, Zhikun Zhang, Linkang Du, Yongmin Zhang, Yan Ren, Jian Zhang
, Hongran Li:
Backdoor attacks against deep reinforcement learning based traffic signal control systems. 466-474
Volume 16, Number 2, March 2023
- Changzhen Zhang

, Zhanyou Ma, Lin Liu, Yilin Liu:
Modeling & analysis of block generation process of the mining pool in blockchain system. 475-487 - Yiran Yang, Xiqing Liu, Zhifeng Wang, Yiliang Liu:

Dynamic shielding to secure multi-hop communications in vehicular platoons. 488-498 - Melak Ayenew

, Hang Lei, Xiaoyu Li
, Weizhong Qian, Eyerusalem Abeje, Wenjia Xiang, Abebe Tegene:
Enhancing the performance of permissionless blockchain networks through randomized message-based consensus algorithm. 499-519 - Lei Hang, Israr Ullah, Jun Yang, Chun Chen:

An improved Kalman filter using ANN-based learning module to predict transaction throughput of blockchain network in clinical trials. 520-537 - Chuxin Zhuang, Qingyun Dai, Jiangzhong Cao:

A blockchain shard storage model suitable for multi-view. 538-553 - Hang Shen

, Xin Liu, Ning Shi, Tianjing Wang, Guangwei Bai:
Blockchain-enabled solution for secure and scalable V2V video content dissemination. 554-570 - Fangfang Gou, Jia Wu:

Novel data transmission technology based on complex IoT system in opportunistic social networks. 571-588 - Shuwei Qiu, Rong Cao, Haiyan Shi, Jianzhong Li, Yanjun Li:

6WPSN: Reliable and efficient IPv6 packet broadcast protocol for IEEE 802.15.4-based wireless powered sensor networks. 589-605 - Jianlong Liu, Jiaye Wen, Yuhang Xie, Lixia Lin, Wen'an Zhou

:
Social-aware D2MD user grouping based on game theory and deep Q-learning. 606-628 - Muhammad Arslan Akram, Adnan Noor Mian, Saru Kumari

:
Fog-based low latency and lightweight authentication protocol for vehicular communication. 629-643 - Ming Luo, Dashi Huang, Minrong Qiu:

Cross-domain heterogeneous signcryption with keyword search for wireless body area network. 644-656 - Kuanishbay Sadatdiynov

, Laizhong Cui, Joshua Zhexue Huang:
Offloading dependent tasks in MEC-enabled IoT systems: A preference-based hybrid optimization method. 657-674 - Chengzhe Lai, Yinzhen Wang, Hong Wang, Dong Zheng:

A blockchain-based traceability system with efficient search and query. 675-689 - Zhen-Fei Wang, Yong-Wang Ren, Zhong-Ya Cao, Li-Ying Zhang:

LRBFT: Improvement of practical Byzantine fault tolerance consensus protocol for blockchains based on Lagrange interpolation. 690-708 - Chunxin Lin, Ying Li

, Manzoor Ahmed, Chenliu Song:
Piece-wise pricing optimization with computation resource constraints for parked vehicle edge computing. 709-726 - Zhe Tu, Huachun Zhou, Kun Li, Haoxiang Song, Wei Quan:

Blockchain-based differentiated authentication mechanism for 6G heterogeneous networks. 727-748 - Zhengyang Ai, Weiting Zhang, Mingyan Li, Pengxiao Li, Lei Shi:

A smart collaborative framework for dynamic multi-task offloading in IIoT-MEC networks. 749-764 - Jorgito Matiuzzi Stocchero

, Andre Dexheimer Carneiro, Iulisloi Zacarias, Edison Pignaton de Freitas:
Combining information centric and software defined networking to support command and control agility in military mobile networks. 765-784 - Javid Ali Liakath, Pradeep Krishnadoss, Gobalakrishnan Natesan:

DCCWOA: A multi-heuristic fault tolerant scheduling technique for cloud computing environment. 785-802 - Jian Wang, Shuai Hao, Guosheng Zhao:

CSSA-based collaborative optimization recommendation of users in mobile crowdsensing. 803-817 - Simona-Vasilica Oprea

, Adela Bâra:
An Edge-Fog-Cloud computing architecture for IoT and smart metering data. 818-845 - Akanksha Goel

, S. Neduncheliyan:
An intelligent blockchain strategy for decentralised healthcare framework. 846-857 - Haibo Wu, Hui Liu, Jun Li:

FabricETP: A high-throughput blockchain optimization solution for resolving concurrent conflicting transactions. 858-875 - Nabanita Das, Souvik Basu, Sipra Das Bit:

OlaRout: Optimal dropbox deployment based cluster routing for post disaster information exchange in a smart city. 876-899 - S. Vidhya

, V. Kalaivani
:
A blockchain based secure and privacy aware medical data sharing using smart contract and encryption scheme. 900-913 - T. Anusha, Mullur Pushpalatha:

C3P-RPL: A collaborative and proactive approach for optimal peer to peer path selection and sustenance. 914-931 - Md Asif Thanedar

, Sanjaya Kumar Panda:
A dynamic resource management algorithm for maximizing service capability in fog-empowered vehicular ad-hoc networks. 932-946 - K. Sridevi, Saifulla Md. Abdul

:
LBABC: Distributed controller load balancing using artificial bee colony optimization in an SDN. 947-957 - K. Kumaran

, E. Sasikala:
An efficient task offloading and resource allocation using dynamic arithmetic optimized double deep Q-network in cloud edge platform. 958-979 - Chuanxin Zhao, Yancheng Yao, Na Zhang, Fulong Chen, Taochun Wang, Yang Wang:

Hybrid scheduling strategy of multiple mobile charging vehicles in wireless rechargeable sensor networks. 980-996 - Jiacheng Hou, Haoye Lu, Amiya Nayak

:
A GNN-based proactive caching strategy in NDN networks. 997-1009 - Naveen Chauhan

, Rajeev Agrawal
, Haider Banka:
Adaptive application offloading for QoS maximization in cloud-fog environment with delay-constraint. 1010-1026 - Sarfaraj Alam Ansari

, Kunwar Pal, Prajjval Govil, Mahesh Chandra Govil:
A fuzzy based hierarchical flash crowd controller for live video streaming in P2P network. 1027-1048 - Paruthi Ilam Vazhuthi Padmanaban

, Aruchamy Prasanth
, Manikandan Shanmugaperumal Periasamy
, K. K. Devi Sowndarya:
A hybrid ANFIS reptile optimization algorithm for energy-efficient inter-cluster routing in internet of things-enabled wireless sensor networks. 1049-1068 - Shuo Peng, Kun Liu, Shiji Wang, Yangxia Xiang, Baoxian Zhang, Cheng Li:

Time window-based online task assignment in mobile crowdsensing: Problems and algorithms. 1069-1087 - Seyed Ali Sadati, Mojtaba Shivaie, AmirAli Nazari:

Computationally efficient peer-to-peer energy trading mechanisms for autonomous agents considering network constraints and privacy preservation. 1088-1105 - Saeed Banaeian Far

, Maryam Rajabzadeh Asaar, Afrooz Haghbin:
A blockchain-based coin mixing protocol with certificateless signcryption. 1106-1124 - Muhammad Faisal Nadeem

, Muhammad Imran, Hafiz Muhammad Afzal Siddiqui
, Muhammad Azeem
:
Fault tolerance designs of interconnection networks. 1125-1134 - Sreya Ghosh

, Iti Saha Misra, Tamal Chakraborty:
Optimal RSU deployment using complex network analysis for traffic prediction in VANET. 1135-1154 - Qaisar Ayub, Sulma Rashid

:
Community trend message locking routing protocol for delay tolerant network. 1155-1173 - Mohammad Naderi

, Khorshid Mahdaee, Parisa Rahmani:
Hierarchical traffic light-aware routing via fuzzy reinforcement learning in software-defined vehicular networks. 1174-1198 - Rajeev Ranjan, Prabhat Kumar:

Mobility-Enabled Sustainable Data Collection in Wireless Sensor Networks. 1199-1210 - Genhua Lu, Xiaofeng Jia, Yi Zhang, Jun Shao, Guiyi Wei:

A domain name management system based on account-based consortium blockchain. 1211-1226 - R. Barona, E. Baburaj:

An efficient DDoS attack detection and categorization using adolescent identity search-based weighted SVM model. 1227-1241 - Lingyu Lu, Jing Yu

, Haifeng Du, Xiang Li:
A3C-based load-balancing solution for computation offloading in SDN-enabled vehicular edge computing networks. 1242-1256 - Yanjun Liu, Hongwei Li, Xinyuan Qian, Meng Hao:

ESA-FedGNN: Efficient secure aggregation for federated graph neural networks. 1257-1269 - Junbin Liang, Qiong Huang, Jianye Huang, Liantao Lan, Man Ho Allen Au:

An identity-based traceable ring signatures based on lattice. 1270-1285 - Wenjie Zhao, Yu Wang, Wenbin Zhai

, Liang Liu, Yulei Liu:
Efficient time-delay attack detection based on node pruning and model fusion in IoT networks. 1286-1309 - P. Arulprakash, A. Suresh Kumar, S. Poorna Prakash:

Optimal route and cluster head selection using energy efficient-modified African vulture and modified mayfly in manet. 1310-1326
Volume 16, Number 3, May 2023
- Yu Wang, Wenyong Wang, Youlu Zeng, Ting Yang

:
GradingShard: A new sharding protocol to improve blockchain throughput. 1327-1339 - Anmulin Wu

, Yajun Guo, Yimin Guo:
A decentralized lightweight blockchain-based authentication mechanism for Internet of Vehicles. 1340-1353 - Yuxia Fu, Jun Shao, Qingjia Huang, Qihang Zhou

, Huamin Feng, Xiaoqi Jia, Ruiyi Wang, Wenzhi Feng:
Non-transferable blockchain-based identity authentication. 1354-1364 - Egide Nkurunziza, Fagen Li:

HAP-SG: Heterogeneous authentication protocol for smart grid. 1365-1379 - Princy Victor, Arash Habibi Lashkari

, Rongxing Lu, Tinshu Sasi, Pulei Xiong, Shahrear Iqbal
:
IoT malware: An attribute-based taxonomy, detection mechanisms and challenges. 1380-1431 - Kai Fan, Zeyu Shi, Yicen Yang, Liyang Bai, Yintang Yang, Kan Yang, Hui Li:

Blockchain-based cloud-edge clock calibration in IoT. 1432-1444 - Pooja Choksy, Akhil Chaurasia, Udai Pratap Rao, Sonu Kumar:

Attribute based access control (ABAC) scheme with a fully flexible delegation mechanism for IoT healthcare. 1445-1467 - Zhibin Liu, Yuhan Liu, Yuxia Lei, Zhenyou Zhou, Xinshui Wang:

ARLO: An asynchronous update reinforcement learning-based offloading algorithm for mobile edge computing. 1468-1480 - Jigyasa Chadha, Aarti Jain

, Yogesh Kumar
:
Satellite imagery-based Airbus ship localization and detection using deep learning-based approaches. 1481-1498 - Seyed Salar Sefati, Mehrdad Abdi, Ali Ghaffari

:
QoS-based routing protocol and load balancing in wireless sensor networks using the markov model and the artificial bee colony algorithm. 1499-1512 - Prarthana J. Mehta, Balu L. Parne, Sankita J. Patel:

SE-LAKAF: Security enhanced lightweight authentication and key agreement framework for smart grid network. 1513-1535 - Guosheng Zhao, Xiao Wang, Jian Wang, Jia Liu:

Task recommendation for mobile crowd sensing system based on multi-view user dynamic behavior prediction. 1536-1550 - Shengzhou Hu, Wenhao Li, Tingting Zhong, Hua He:

An innovative key agreement protocol with complex attribute authentication based on blockchain. 1551-1569 - Changzhen Zhang

, Zhanyou Ma, Lin Liu, Yilin Liu:
Correction to: Modeling & analysis of block generation process of the mining pool in blockchain system. 1570 - S. Kranthi

, M. Kanchana
, M. Suneetha
:
Correction: An intelligent intrusion prediction and prevention system for software defined internet of things cloud networks. 1571 - M. Sudha, V. P. Galdis pushparathi:

Editorial Expression of Concern: Traffic sign detection and recognition using RGSM and a novel feature extraction method. 1572 - Retraction Note: RFDCAR: Robust failure node detection and dynamic congestion aware routing with network coding technique for wireless sensor network. 1573

- Retraction Note: SPAHN novel approach for PL-AG gateway discovery for internet connectivity. 1574

- Retraction Note: Machine learning based multi scale parallel K-means + + clustering for cloud assisted internet of things. 1575

- Retraction Note: Improved multi objective data transmission using conventional route selection algorithm in mobile ad hoc network. 1576

- Retraction Note: Defense model for preserving the wind turbine records in cloud using fog computing with coupling based cryptography. 1577

- Retraction Note: Secure access control for manufacturing sector with application of ethereum blockchain. 1578

- Retraction Note: Delay sensitive aware distributed data fault recognition algorithm for distributed sensor networks. 1579

- Retraction Note: Data transmission and real-time information acquisition based on fine-grained algorithm and wireless network. 1580

- Retraction Note: Energy efficient topology management scheme based on clustering technique for software defined wireless sensor network. 1581

Volume 16, Number 4, August 2023
- Du Chen, Deyun Gao, Lu Jin, Wei Quan, Hongke Zhang:

ADAS: Adaptive Delay-Aligned Scheduling for Multipath Transmission in Heterogeneous Wireless Networks. 1583-1595 - Xuewen He, Kaihua Cao:

LoRa network communication protocol based on location and time planning. 1596-1608 - Vijay Rayar, Udaykumar Naik, Prabhakar S. Manage:

A RSS-based path loss model approaches multi-dimensional scaling to localize 2D sensor nodes in WSN. 1609-1623 - Nour El Houda Bourebia

, Chunlin Li:
A novel raccoon optimization algorithm with multi-objective clustering strategy based routing protocol for WSNs. 1624-1640 - Peiyan Yuan, Zhao Han, Xiaoyan Zhao:

Integrating the edge intelligence technology into image composition: A case study. 1641-1651 - Tao Li, Yali Liu, Jianting Ning:

SDRLAP: A secure lightweight RFID mutual authentication protocol based on PUF with strong desynchronization resistance. 1652-1667 - Zijia Wang, Baoxian Zhang, Yangxia Xiang, Cheng Li

:
Joint task assignment and path planning for truck and drones in mobile crowdsensing. 1668-1679 - Jie Yin, Chuntang Zhang, Wenwei Xie, Guangjun Liang, Lanping Zhang, Guan Gui:

Anomaly traffic detection based on feature fluctuation for secure industrial internet of things. 1680-1695 - Junlu Wang, Su Li, Wanting Ji, Dong Li, Baoyan Song:

A composite blockchain associated event traceability method for financial activities. 1696-1715 - Shengchen Duan, Hong Liu, Lize Gu:

A searchable encryption scheme with hidden search pattern and access pattern on distributed cloud system. 1716-1738 - Suguna Paramasivam, R. Leela Velusamy:

Quality of service aware routing in software defined video streaming: a survey. 1739-1760 - Anu Monisha A

, T. R. Reshmi, Krishnan Murugan:
ERNSS-MCC: Efficient relay node selection scheme for mission critical communication using machine learning in VANET. 1761-1784 - Morteza Adeli, Nasour Bagheri, Sadegh Sadeghi, Saru Kumari:

χperbp: a cloud-based lightweight mutual authentication protocol. 1785-1802 - Feng Zeng, Ranran Rou, Qi Deng, Jinsong Wu

:
Parked vehicles crowdsourcing for task offloading in vehicular edge computing. 1803-1818 - R. Sarath Kumar

, P. Sampath, M. Ramkumar
:
Enhanced Elman Spike Neural Network fostered intrusion detection framework for securing wireless sensor network. 1819-1833 - Xiaoyan Hu, Weicheng Zhou, Jun Yin, Guang Cheng, Shen Yan, Hua Wu:

Towards verifiable and privacy-preserving account model on a consortium blockchain based on zk-SNARKs. 1834-1851 - Deepak Choudhary, Roop Pahuja

:
A blockchain-based cyber-security for connected networks. 1852-1867 - Bidisha Bhabani, Judhistir Mahapatro:

TRP: A TOPSIS-based RSU-enabled priority scheduling scheme to disseminate alert messages of WBAN sensors in hybrid VANETs. 1868-1886 - Guosheng Zhao, Cai Ren, Jian Wang, Yuyan Huang, Huan Chen:

IoT intrusion detection model based on gated recurrent unit and residual network. 1887-1899 - Elham Ebrahimpour, Shahram Babaie:

A Lightweight authentication approach based on linear feedback shift register and majority function for internet of things. 1900-1915 - Faezeh Alizadeh, Amir Jalaly Bidgoly:

Bit flipping attack detection in low power wide area networks using a deep learning approach. 1916-1926 - Bei Yu, Libo Feng

, Hongyu Zhu, Fei Qiu, Ji Wan, Shaowen Yao:
MeHLDT: A multielement hash lock data transfer mechanism for on-chain and off-chain. 1927-1943 - Jia Liu, Jian Wang, Yuping Yan, Guosheng Zhao:

A task allocation method based on data fusion of multimodal trajectory in mobile crowd sensing. 1944-1958 - Duraimurugan Samiayya, S. Radhika, A. Chandrasekar:

An optimal model for enhancing network lifetime and cluster head selection using hybrid snake whale optimization. 1959-1974 - Ravi Raushan Kumar Chaudhary, Kakali Chatterjee:

A Lightweight PUF based Multi-factor Authentication Technique for Intelligent Smart Healthcare System. 1975-1992 - Sivanandam Sivamohan, S. S. Sridhar, Sivamohan Krishnaveni

:
TEA-EKHO-IDS: An intrusion detection system for industrial CPS with trustworthy explainable AI and enhanced krill herd optimization. 1993-2021
Volume 16, Number 5, September 2023
- Mian Guo, Chengyuan Xu, Mithun Mukherjee

:
RIS-assisted device-edge collaborative edge computing for industrial applications. 2023-2038 - Junyan Chen, Xuefeng Huang, Yong Wang, Hongmei Zhang, Cenhuishan Liao, Xiaolan Xie, Xinmei Li, Wei Xiao:

ASTPPO: A proximal policy optimization algorithm based on the attention mechanism and spatio-temporal correlation for routing optimization in software-defined networking. 2039-2057 - Yu Gao, Jun Tao, Haotian Wang, Zuyan Wang, Dika Zou, Yifan Xu:

Benefit-oriented task offloading in UAV-aided mobile edge computing: An approximate solution. 2058-2072 - Bin Zhao, Jiqun Zhang

, Cao Wei, Li Bin, Wenyin Zhang, Yilong Gao:
A dynamic evaluation model of data price based on game theory. 2073-2088 - S. Nagadivya, R. Manoharan:

Energy efficient fuzzy logic prediction-based opportunistic routing protocol (EEFLPOR) for wireless sensor networks. 2089-2102 - Peiyue Jiang, Chengye Zheng, Qinchun Ke, Xiaobo Gu:

Robust cooperative localization using peer-to-peer ranging measurements. 2103-2112 - Antony Prince John, Jagadhiswaran Devaraj, Lathaselvi Gandhimaruthian, Javid Ali Liakath

:
Swarm learning based credit scoring for P2P lending in block chain. 2113-2130 - B. Naresh Kumar, Jai Sukh Paul Singh:

Development of multi-objective cognitive radio network with energy harvesting for medical data transmission. 2131-2152 - Jay Nagarajan, Pegah Mansourian, Muhammad Anwar Shahid

, Arunita Jaekel, Ikjot Saini
, Ning Zhang, Marc Kneppers:
Machine Learning based intrusion detection systems for connected autonomous vehicles: A survey. 2153-2185 - Soni Chaurasia

, Kamal Kumar:
ACRA: Adaptive meta-heuristic based Clustering and Routing Algorithm for IoT-assisted wireless sensor network. 2186-2201 - Yanyan Duan, Fenghua Huang, Lingwei Xu, T. Aaron Gulliver:

Intelligent spectrum sensing algorithm for cognitive internet of vehicles based on KPCA and improved CNN. 2202-2217 - Dawei Xu, Jiaqi Gao, Liehuang Zhu, Feng Gao, Yang Han, Jian Zhao:

B-Tor: Anonymous communication system based on consortium blockchain. 2218-2241 - Xiaopeng Yu, Jie Feng, Wei Zhao, Haomiao Yang, Dianhua Tang:

Peer-to-peer privacy-preserving vertical federated learning without trusted third-party coordinator. 2242-2255 - Irshad Ullah, Xiaoheng Deng, Xinjun Pei

, Ping Jiang, Husnain Mushtaq
:
A verifiable and privacy-preserving blockchain-based federated learning approach. 2256-2270 - Yan Wang, Yuxin Gong, Huikang Yang:

A mobile localization algorithm based on fuzzy estimation for serious NLOS scenes. 2271-2289 - Gopal Singh Rawat, Karan Singh:

A bayesian-based distributed trust management scheme for connected vehicles' security. 2290-2306 - S. Nikkath Bushra

, Nalini Subramanian, A. Chandrasekar:
An optimal and secure environment for intrusion detection using hybrid optimization based ResNet 101-C model. 2307-2324 - Sanaa Kaddoura

, Ramzi A. Haraty, Sultan Aljahdali, Maram Assi:
SDODV: A smart and adaptive on-demand distance vector routing protocol for MANETs. 2325-2348 - Xiaohong Zhang, Jiaming Lai, Ata Jahangir Moshayedi:

Traffic data security sharing scheme based on blockchain and traceable ring signature for VANETs. 2349-2366 - K. Swapna Sudha, N. Jeyanthi

:
Merkle hash tree improved strongly constrained discrete hashing function-based authentication scheme for enabling security for smart home IoT applications. 2367-2379 - P. Deepavathi, C. Mala:

IMDRPL: Identifying and eliminating malicious devices using DIO and DAO ICMP control messages in RPL-based protocol. 2380-2398 - Xueyan Liu, Linpeng Li, Ruirui Sun, Wenjing Li, Tao Liu:

Lightweight multi-departmental data sharing scheme based on consortium blockchain. 2399-2414 - Jhong-Ting Lou, Showkat Ahmad Bhat, Nen-Fu Huang:

Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system. 2415-2437 - Khuong Ho-Van:

Jammer selection for energy harvesting-aided non-orthogonal multiple access: Performance analysis. 2438-2455 - P. Sheela Rani

, S. Baghavathi Priya:
A block chain-based approach using proof of continuous work consensus algorithm to secure the educational records. 2456-2473 - Shuangrong Peng, Xiaohu Tang, Ling Xiong, Hui Zhu:

LGAAFS: A lightweight group anonymous mutual authentication and forward security scheme for wireless body area networks. 2474-2491 - Weiyou Liang, Yujue Wang, Yong Ding

, Haibin Zheng, Hai Liang, Huiyong Wang:
An efficient blockchain-based anonymous authentication and supervision system. 2492-2511 - S. Ambareesh

, H. C. Kantharaju, M. Sakthivel
:
A novel Fuzzy TOPSIS based hybrid jarratt butterfly optimization for optimal routing and cluster head selection in WSN. 2512-2524 - Raghav

, Nitish Andola, S. Venkatesan, Shekhar Verma:
Privacy-preserving cloud data sharing for healthcare systems with hybrid blockchain. 2525-2547 - Bshisht Moony, Amit K. Barnwal

, Mrityunjay Singh, Dheerendra Mishra
:
Quantum secure two party authentication protocol for mobile devices. 2548-2559 - Gobalakrishnan Natesan, Manikandan Nanjappan, Pradeep Krishnadoss, L. Sherly Puspha Annabel:

Task scheduling based on minimization of makespan and energy consumption using binary GWO algorithm in cloud environment. 2560-2573 - Ruizhong Du

, Chenghao Yu, Mingyue Li:
Enabling efficient and verifiable secure search on cloud-based encrypted big data. 2574-2590 - Yangyang Jiang, Yepeng Guan:

A cluster reputation-based hierarchical consensus model in blockchain. 2591-2606 - S. Madhavi

, Ramalingam Praveen
, N. Jagadish Kumar
, S. M. Udhaya Sankar
:
Hybrid Grey PIPRECIA and Grey OCRA method-based dynamic multi-criteria decision-making model for mitigating non-cooperating node attacks in WSNs. 2607-2629 - Xinyu Yi, Yuping Zhou, Yuqian Lin, Ben Xie, Junjie Chen, Chenye Wang:

Digital rights management scheme based on redactable blockchain and perceptual hash. 2630-2648 - Xiaohua Wu

, Fangjian Yu, Jing Wang, Jinpeng Chang, Xueqi Feng:
Bpf-payment: Fair payment for cloud computing with privacy based on blockchain and homomorphic encryption. 2649-2666
Volume 16, Number 6, November 2023
- Jian Chen, Kaili Zhai, Jie Jia, An Du, Yi Xue, Xingwei Wang:

Online resource allocation for QoE optimization in CoMP-assisted eMBMS system. 2667-2680 - Bing Tang, Shaifeng Zheng, Qing Yang:

Joint optimization of energy and delay for computation offloading in vehicular edge computing. 2681-2695 - V. Krishnakumar

, R. Asokan:
Block chain based trusted distributed routing scheme using optimized dropout ensemble extreme learning neural network in MANET. 2696-2713 - Sai Srinivas Vellela

, R. Balamanigandan:
An intelligent sleep-awake energy management system for wireless sensor network. 2714-2731 - Haohua Zhu, Rongxin Guo, Wenxian Jiang, Bolun Pan:

Blockchain-based technology for commerce data management using reputation algorithm with QoS mechanism. 2732-2746 - R. Prabha

, G. A. Senthil
, SU. Suganthi
:
Cluster head based secure routing using optimized dual-discriminator conditional generative adversarial network in wireless ad-hoc networks. 2747-2760 - Jingting Xue, Lingjie Shi, Liang Liu, Xiaojun Zhang, Fagen Li:

Anonymity-enhancing decentralized protocol for coin mixing based on ring signatures and key derivation. 2761-2774 - Guosheng Zhao, Huan Chen, Jian Wang:

A lightweight block encryption algorithm for narrowband internet of things. 2775-2793 - Meena Rao

, Parul Chaudhary
, Kavita Sheoran, Geetika Dhand:
A secure routing protocol using hybrid deep regression based trust evaluation and clustering for mobile ad-hoc network. 2794-2810 - Shakira Musa Baig, Muhammad Umar Javed

, Ahmad Almogren, Nadeem Javaid, Mohsin Jamil:
A blockchain and stacked machine learning approach for malicious nodes' detection in internet of things. 2811-2832 - Ruchi Garg, Tarun Gulati

, Sumit Kumar:
Wormhole attack detection and recovery for secure range free localization in large-scale wireless sensor networks. 2833-2849 - Rui Han, Yu Wang, Mingfa Wan, Teng Yuan, Guozi Sun:

FIBPRO: Peer-to-peer data management and sharing cloud storage system based on blockchain. 2850-2864 - Xianzhong Tian, Pengcheng Xu, Yifan Shen, Yuheng Shao:

Joint DNN partitioning and resource allocation for completion rate maximization of delay-aware DNN inference tasks in wireless powered mobile edge computing. 2865-2878 - Jianshan Zhang, Ming Li, Bing Lin

, Katinka Wolter:
Joint optimization of IoT devices access and bandwidth resource allocation for network slicing in edge-enabled radio access networks. 2879-2891 - Yihan Kong, Jing Li, Ting Xiong, Tao Xie:

EVONChain: a bi-tiered public blockchain network architecture. 2892-2914 - Zhen-Fei Wang, Shi-Qi Liu, Pu Wang, Li-Ying Zhang:

BW-PBFT: Practical byzantine fault tolerance consensus algorithm based on credit bidirectionally waning. 2915-2928 - Behnam Mohammad Hasani Zade, Mohammad Masoud Javidi, Najme Mansouri:

An improved Caledonian crow learning algorithm based on ring topology for security-aware workflow scheduling in cloud computing. 2929-2984 - Tania Saleem, Muhammad Ismaeel, Muhammad Umar Janjua, Abdulrahman Ali, Awab Aqib, Ali Ahmed, Saeed-Ul Hassan:

Predicting functional roles of Ethereum blockchain addresses. 2985-3002 - Murat Karakus, Evrim Guler, Suleyman Uludag

:
Smartcontractchain (SC2): Cross-ISP QoS traffic management framework with SDN and blockchain. 3003-3020 - Monica Bhutani

, Brejesh Lall, Monika Agrawal:
A novel energy-efficient adaptive superframe structure for OWC-based real-time bio-sensor networks. 3021-3031 - Fei Yan, Hongbin Luo, Shan Zhang, Zhiyuan Wang, Peng Lian:

A comparative study of IP-based and ICN-based link-state routing protocols in LEO satellite networks. 3032-3046

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














