Stop the war!
Остановите войну!
for scientists:
default search action
Peer-to-Peer Networking and Applications, Volume 17
Volume 17, Number 1, January 2024
- Judy Simon, M. Aarthi Elaveini, Nellore Kapileswar, Phani Kumar Polasi:
ARO-RTP: Performance analysis of an energy efficient opportunistic routing for underwater IoT networks. 1-17 - Xuhang Jiang, Yujue Wang, Yong Ding, Zhenyu Li, Huiyong Wang, Hai Liang:
Semi-shadow file system: An anonymous files storage solution. 18-32 - Kunpeng Wang, Jingmei Li, Weifei Wu:
A novel transfer extreme learning machine from multiple sources for intrusion detection. 33-47 - Wenbo Zhang, Xiaotong Huo, Zhenshan Bao:
An alliance chain-based incentive mechanism for PSG data sharing. 48-67 - Chahrazed Benrebbouh, Houssem Mansouri, Sarra Cherbal, Al-Sakib Khan Pathan:
Enhanced secure and efficient mutual authentication protocol in IoT-based energy internet using blockchain. 68-88 - S. Rajasoundaran, Sripathi Venkata Naga Santhosh Kumar, Munuswamy Selvi, Arputharaj Kannan:
Reactive handover coordination system with regenerative blockchain principles for swarm unmanned aerial vehicles. 89-114 - Haoxiang Wang, Weidong Yang, Wei Wei:
Efficient algorithms for urban vehicular Ad Hoc networks quality based on average network flows. 115-124 - Ming Luo, Xinhuang Zhou, Minrong Qiu:
A revocable anonymous cross-domain communication scheme for smart grid based on ring signcryption. 125-138 - Sapna Jha, Aditya Trivedi, K. K. Pattanaik, Himanshu Gauttam, Paolo Bellavista:
Efficient data harvesting from boundary nodes for smart irrigation. 139-162 - D. Udaya Suriya Rajkumar, Shanmugaraja P, K. Arunkumar, Sathiyaraj R, Manivannan P:
A HSEERP - Hierarchical secured energy efficient routing protocol for wireless sensor networks. 163-175 - Komuraiah Bejjam, M. S. Anuradha:
A New Trust-Based Optimal Stochastic Data Scheduling for Wireless Sensor Networks. 176-199 - Ta Minh Thanh, Tien Quyet Do:
A study on gas cost of ethereum smart contracts and performance of blockchain on simulation tool. 200-212 - Jing Zhang, Jian-Yu Hu, Liwei Lin, Xiucai Ye:
Attribute and closeness based scheduling model for vehicle-to-grid network. 213-226 - Fang Li, Hang Shen, Jieai Mai, Tianjing Wang, Yuanfei Dai, Xiaodong Miao:
Pre-trained language model-enhanced conditional generative adversarial networks for intrusion detection. 227-245 - Yanjun Liu, Hongwei Li, Meng Hao:
SVFGNN: A privacy-preserving vertical federated graph neural network model training framework based on split learning. 246-260 - Yibin Zhang, Jinlong Sun, Guan Gui, Yun Lin, Haris Gacanin, Hikmet Sari, Fumiyuki Adachi:
Attention mechanism based intelligent channel feedback for mmWave massive MIMO systems. 261-283 - Songshou Dong, Yanqing Yao, Yihua Zhou, Yu-Guang Yang:
A lattice-based unordered certificateless aggregate signature scheme for cloud medical health monitoring system. 284-296 - Parisa Rahmani, Mohamad Arefi:
Improvement of energy-efficient resources for cognitive internet of things using learning automata. 297-320 - Vinod Kumar Mahor, R. Padmavathy, Santanu Chatterjee:
Secure and lightweight authentication protocol for anonymous data access in cloud assisted IoT system. 321-336 - Jay Gandhi, Zunnun Narmawala:
A case study on the estimation of sensor data generation in smart cities and the role of opportunistic networks in sensor data collection. 337-357 - Leyou Yang, Jie Jia, Jian Chen, Xingwei Wang:
Joint power allocation and blocklength assignment for reliability optimization in CA-enabled HetNets. 358-372 - Patruni Muralidhara Rao, Bakkiam David Deebak:
Lightweight two-factor authentication framework with privacy preserving for smart eHealth. 373-396 - Himadry Sekhar Roy, Prakash Dey, Sandip Kumar Mondal, Avishek Adhikari:
Cryptanalysis of full round FUTURE with multiple biclique structures. 397-409 - Zahra Seyedi, Farhad Rahmati, Mohammad Ali, Ximeng Liu:
Verifiable and privacy-preserving fine-grained data management in vehicular fog computing: A game theory-based approach. 410-431 - Rituparna Paul, Shanvendra Rai, Subhasish Banerjee, Preetisudha Meher:
A Robust Smart Card based Authentication and Key Agreement Scheme for WSN using Fuzzy Extractor. 432-450 - Disuja Kumari, Karan Singh:
Lightweight secure authentication and key agreement technique for smart grid. 451-478 - Menas Ebrahim Eissa, M. A. Mohamed, Mohamed Maher Ata:
A robust supervised machine learning based approach for offline-online traffic classification of software-defined networking. 479-506 - Sepideh Niktabe, Arash Habibi Lashkari, Arousha Haghighian Roudsari:
Unveiling DoH tunnel: Toward generating a balanced DoH encrypted traffic dataset and profiling malicious behavior using inherently interpretable machine learning. 507-531 - Xi Liu, Jun Liu:
A truthful mechanism for multi-access multi-server multi-task resource allocation in mobile edge computing. 532-548 - N. Nandini Devi, Surmila Thokchom, Gautam Srivastava, Rutvij H. Jhaveri, Diptendu Sinha Roy:
Demcrp-et: decentralized multi-criteria ranked prosumers energy trading using distributed ledger technology. 549-565 - Judy Simon, M. Aarthi Elaveini, Nellore Kapileswar, Phani Kumar Polasi:
Correction to: ARO-RTP: Performance analysis of an energy efficient opportunistic routing for underwater IoT networks. 566 - Junlu Wang, Su Li, Wanting Ji, Dong Li, Baoyan Song:
Author Correction to: A composite blockchain associated event traceability method for financial activities. 567-568
Volume 17, Number 2, March 2024
- Hui Xie, Jun Zheng, Teng He, Shengjun Wei, Changzhen Hu:
A blockchain-based ubiquitous entity authentication and management scheme with homomorphic encryption for FANET. 569-584 - K. Dinesh, S. V. N. Santhosh Kumar:
GWO-SMSLO: Grey wolf optimization based clustering with secured modified Sea Lion optimization routing algorithm in wireless sensor networks. 585-611 - Shijie Tang, Yong Ding, Meng Zhao, Huiyong Wang:
SAKMR: Industrial control anomaly detection based on semi-supervised hybrid deep learning. 612-623 - Haradhan Ghosh, Pramod Kumar Maurya, Satya Bagchi:
Secret sharing based RFID protocol using ECC for TMIS. 624-638 - Chunjiao Li, Liangmin Wang, Jiayi Li, Yue Fei:
CIM: CP-ABE-based identity management framework for collaborative edge storage. 639-655 - Qingquan Bian, Yue Zhang, Chang Song, Axin Wu:
Flexible symmetric predicate encryption for data privacy in IoT environments. 656-664 - Chandan Trivedi, Keyur Parmar, Udai Pratap Rao:
PGASH: Provable group-based authentication scheme for Internet of Healthcare Things. 665-684 - Min Liu, Liangliang Wang, Kai Zhang, Yu Long, Baodong Qin:
A pairing-free certificate-based key-insulated aggregate signature scheme for wireless medical sensor networks. 685-700 - Anurag Shukla, Sarsij Tripathi, Mohit Sajwan, Deepak Singh:
SEE2PK: Secure and energy efficient protocol based on pairwise key for hierarchical wireless sensor network. 701-721 - V. Sasireka, Shyamala Ramachandran:
Hybrid optimized task scheduling with multi-objective framework for crowd sensing in mobile social networks. 722-738 - Xin Su, Shengwen Wang, Renzhu Yu:
A bibliometric analysis of blockchain development in industrial digital transformation using CiteSpace. 739-755 - Xinyu Lai, Youchi Zhang, Haoxiang Luo:
A low-cost blockchain node deployment algorithm for the internet of things. 756-766 - V. Deepa, B. Sivakumar:
Heuristic-aided multi-objective function for satellite controller placement and routing in integrated satellite terrestrial network. 767-783 - D. Hemkumar:
Preserving location privacy against inference attacks in indoor positioning system. 784-799 - Xia Deng, Junbin Shao, Le Chang, Junbin Liang:
A Blockchain-based Privacy Protection Protocol using Smart Contracts in LEO satellite networks. 800-818 - Jiangshan Hao, Linghao Zhang, Yanchao Zhao:
Grouped federated learning for time-sensitive tasks in industrial IoTs. 819-833 - Gurjot Kaur, Deepti Kakkar:
DRIVE: Dual rider-remora optimization for vehicular routing. 834-857 - Tian-Fu Lee, I-Pin Chang, Jyun-Guo Wang, Yen-Chang Chen, Sheng-Tzung Tsai, Rui-Yu Chen:
Extended chaotic map-based key management for hierarchical access control in e-medicine systems. 858-870 - Yi Gong, Hongbin Liang, Lei Wang, Yiting Yao:
Anonymous credentials for the internet of vehicles. 871-880 - S. Vinu, B. Diwan:
Tangent Pelican search optimization for block assignment in blockchain based IoT. 881-895 - Wenguang Zhou, Zhiwei Jia, Chao Feng, Huali Lu, Feng Lyu, Ling Li:
Towards driver distraction detection: a privacy-preserving federated learning approach. 896-910 - G. Sahaya Stalin Jose, Sugitha G, Ayshwarya Lakshmi S, B. C. Preethi:
A multi-objective privacy preservation model for cloud security using hunter prey optimization algorithm. 911-923 - M. Anuradha, Jean Justus John, L. Mary Immaculate Sheela:
MMCNN-ZO: Modified multi-scale convolutional neural network-based zebra optimization for enhancing data encryption system. 924-943 - Xueshu Hong, Shaoyong Li, Xingkong Ma, Bo Liu, Fan Wu:
A website fingerprinting technology with time-sampling. 944-960 - Rathindra Nath Biswas, Anurup Saha, Swarup Kumar Mitra, Mrinal Kanti Naskar:
Design and implementation of anchor coprocessor architecture for wireless node localization applications. 961-984 - Xingchen Liu, Shaohui Zhang, Haiping Huang, Reza Malekian:
A trustworthy and reliable multi-keyword search in blockchain-assisted cloud-edge storage. 985-1000 - Yanming Fu, Shenglin Lu, Jiayuan Chen, Xiao Liu, Bocheng Huang:
Socially-aware and privacy-preserving multi-objective worker recruitment in mobile crowd sensing. 1001-1019 - Retraction Note: Issues of crowdsourcing and mobile app development through the intellectual property protection of third parties. 1020
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.