default search action
Peer-to-Peer Networking and Applications, Volume 18
Volume 18, Number 1, February 2025
- Sumayah A. Almuntasheri, Mohammed J. F. Alenazi:
EEPS: Optimizing energy-efficient path selection in the Internet of Battlefield Things (IoBT) utilizing SDN. 1-23 - Jian Luo, Zechao Chen, Wenxiong Chen, Huali Lu, Feng Lyu:
A study on the application of the T5 large language model in encrypted traffic classification. 1-13 - Changsong Yang, Yueling Liu, Yong Ding:
Fine-grained data deletion supporting dynamic data insertion for cloud storage. 1-16 - Biao Ma, Haifeng Qian:
A scalable identity management scheme via blockchain: Identity protection and traceability. 1-12 - Jingliang Wen, Changli Zhou, Linghui Zhang:
Efficient anti-quantum attack batch authentication and key agreement protocol based on NTRU in VANET. 1-21 - Yi Li, Jinsong Wang, Zening Zhao, Duobin Lv:
Hague: a hybrid scaling stateless blockchain. 1-16 - Bhabani Sankar Samantray, K. Hemant Kumar Reddy:
A novel secure supply chain for smart healthcare systems: An approach to leverage blockchain, Keccak-256, and ZKP for drug safety assurance. 1-17 - Mo Hai, Wenchang Li, Haifeng Li:
An efficient propagation algorithm based on node clustering and seed node selection in a blockchain network. 1-15 - You Lu, Zhe Zhang, Xiao Xu, Lanhui Liu, Qiming Fu, Jianping Chen, Chen Chen:
GTD3-NET: A deep reinforcement learning-based routing optimization algorithm for wireless networks. 1-12 - Weimin Li, ZiTong Li, Zhengmao Yan, Yi Liu, Detian Zeng, Haoyang Yu, Wenxiong Chen, Fan Wu:
A data encryption and file sharing framework among microservices-based edge nodes with blockchain. 1-16 - Tao Zheng, Xueyang Li, Xingshu Chen, Hao Ren, Changxiang Shen:
Efficient privacy-preserving federated logistic regression with poor-quality users. 1-12 - Mamta Mann, Rishipal Singh:
Optimized stochastic particle swarm optimization integrated ranked backoff medium access control for optimal route selection in wireless sensor networks. 1-17 - Haoran Shi, Zehua Chen, Yongqiang Cheng, Xiaofeng Liu, Qianqian Wang:
PB-Raft: A Byzantine fault tolerance consensus algorithm based on weighted PageRank and BLS threshold signature. 1-16 - E. S. Phalguna Krishna, Daria Sandeep, Raviteja Kocherla, Kranthi Kumar Lella, Srikanth Molugu, Shaik Hussain Shaik Ibrahim, Ramesh Vatambeti:
Enhancing intrusion detection in MANETs with blockchain-based trust management and enhanced GRU model. 1-22 - G. Suneetha, D. Haripriya:
An enhanced deep learning integrated blockchain framework for securing industrial IoT. 1-20 - Richa Kumari, Dinesh Kumar Tyagi, Ramesh Babu Battula:
NEIL: aN EfficIent cLuster-based device discovery for D2D communication in B5G. 1-25 - Hongxia Zhang, Zeya Li, Shiyu Xi, Xiangxu Zhao, Jianhang Liu, Peiying Zhang:
Heterogeneity-aware device selection for clustered federated learning in IoT. 1-17 - Irshad Ullah, Xiaoheng Deng, Xinjun Pei, Husnain Mushtaq, Muhammad Uzair:
IoV-SFL: A blockchain-based federated learning framework for secure and efficient data sharing in the internet of vehicles. 1-20 - Muhammad Kashif, Kübra Kalkan:
Differential privacy preserving based framework using blockchain for internet-of-things. 1-23 - Ran Wang, Fuqiang Ma, Sisui Tang, Hangning Zhang, Jie He, Zhiyuan Su, Xiaotong Zhang, Cheng Xu:
Parallel Byzantine fault tolerance consensus based on trusted execution environments. 1-24 - Swati Priyambada Satpathy, Sujata Mohanty, Manabhanjan Pradhan:
A sustainable mutual authentication protocol for IoT-Fog-Cloud environment. 1-23 - Guanjie Li, Tom H. Luan, Jinkai Zheng, Dihao Hu, Jie Cao, Yalun Wu:
A secure and lightweight data sharing scheme in vehicular digital twin network. 1-17 - Chandra Priya Jayabal, Priyadharsini Selvaraj, Madhavan M., Nikil Sri Shen R.:
WikiChain: An improved resilient, pseudo-transparent knowledge base. 1-24 - Jian Wang, Fanfan Meng, Jia Liu, Guanzhi He, Guosheng Zhao:
Multimodal data privacy protection and completeness verification method for mobile crowd sensing. 1-20 - Rachit Patel, Rajeev Arya:
Trust-based resource allocation and task splitting in ultra-dense mobile edge computing network. 1-17 - Aparna Singh, Geetanjali Rathee:
Smart contract empowered dynamic consent: decentralized storage and access control for healthcare applications. 1-16 - Nagarajan B, Santhosh Kumar SVN:
An intelligent sailfish optimization based fault diagnosis and classification in wireless sensor networks. 1-22 - Raja Basha Adam Sahib, R. Bhavani:
IoT-based smart healthcare using efficient data gathering and data analysis. 1-24 - Zhixin Xie, Ying Su, Guangbiao Liu, Yishi Yang, Peyman Arebi:
Dynamical repair strategy of data network controllability processes against DoS attack on complex temporal networks. 1-15 - Rachit Patel, Rajeev Arya:
Trust-based resource allocation and task splitting in ultra-dense mobile edge computing network. 1-17 - Dongyu Cao, Bixin Li, Jingyuan Cai:
A privacy-preserving method for cross-chain interoperability using homomorphic encryption. 1-16 - B. Nagarajan, Santhosh Kumar SVN:
An intelligent fault node diagnosis and classification approach using XGBoost with whale optimization in wireless sensor networks. 1-20 - K. Mekala, S. Sumathi, Belsam Jeba Ananth M:
Coot-feedback artificial tree-based energy-aware electric vehicle charge scheduling algorithm. 1-17 - Monali Shetty, Sharvari Tamane:
Unveiling bitcoin network attack using deep reinforcement learning with Boltzmann exploration. 1-19 - Hang Zhang, Jinsong Wang, Zening Zhao, Huayue Sun:
Security resource allocation in blockchain-based IoT. 1-12 - Yuan Zhao, Yan Li, Hongmin Gao, Shuangshuang Yuan:
Performance analysis of D2D cooperative networks based on probabilistic relay forwarding mechanism. 1-18 - Brijmohan Lal Sahu, Preeti Chandrakar:
Blockchain-oriented secure communication and smart parking model for internet of electric vehicles in smart cities. 1-17 - Neha Sharma, Pankaj Dhiman:
Design of secure and unique addressing with mutual authentication scheme in IoT networks. 1-18 - G. A. Thushara, S. Mary Saira Bhanu:
Chebyshev chaotic map with attribute based encryption on session based data-sharing in fog environment. 1-25 - Vinay Maurya, Vinay Rishiwal, Mano Yadav, Mohammad Shiblee, Preeti Yadav, Udit Agarwal, Rashmi Chaudhry:
Blockchain-driven security for IoT networks: State-of-the-art, challenges and future directions. 1-35 - Shams Mhmood Abd Ali, Mohd Najwadi Yusoff, Je Sen Teh, Hasan Falah Hasan:
OREVI_PCH: An optimized resource-efficient redaction mechanism with integrity validation in policy-based chameleon hash for IoT applications. 1-17 - Shahrbanoo Zangaraki, Meghdad Mirabi, Seyed Hossein Erfani, Amir Sahafi:
SecShield: An IoT access control framework with edge caching using software defined network. 1-17 - S. Harishkumar, R. S. Bhuvaneswaran:
Enhanced DGA detection in Botnet traffic: leveraging N-Gram, topic modeling, and attention BiLSTM. 1-20 - Ayodeji Ayorinde, John Panneerselvam, Bo Yuan, Lu Liu:
A multi-cycle recursive clustering algorithm for the analysis of social media data streams. 1-18 - Liyuan Zhang, Limian Ci, Yonghong Wu, Benchawan Wiwatanapataphee:
The real estate tokenized investment system based on ethereum blockchain. 1-24 - Huizi Tian, Lin Zhu, Long Tan:
A joint task caching and computation offloading scheme based on deep reinforcement learning. 1-19 - Zhiying Wang, Guanhua Huang, Gang Sun, Hongfang Yu, Jian Sun:
Reinforcement Q-learning enabled energy-efficient service function chain provisioning in multi-domain networks. 1-19 - Vikramjit Singh, Krishna Pal Sharma, Harsh Kumar Verma:
CLGR: Connectivity and link quality aware geographical routing using AHP-TOPSIS for FANETs. 1-20 - Wei Chen, Xiangyang Li, Gaoli Wang, Leibo Li, Jiachen Shen, Entang Li:
HML-BFT: Hybrid multi-layer BFT consensus with reputation model for large-scale blockchain. 1-14 - Prity Rani, Rohit Kumar Sachan, Sonal Kukreja:
BT-CNV: A distributed and decentralized solution for certificate notarization and verification for academia using public blockchain. 1-26
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.