default search action
Peer-to-Peer Networking and Applications, Volume 16
Volume 16, Number 1, January 2023
- Sanjeev Kumar Dwivedi, Ruhul Amin, Satyanarayana Vollala:
Smart contract and IPFS-based trustworthy secure data storage and device authentication scheme in fog computing environment. 1-21 - Srivel Ravi, Saravanan Matheswaran, Uma Perumal, Shanthi Sivakumar, Srinivas Kumar Palvadi:
Adaptive trust-based secure and optimal route selection algorithm for MANET using hybrid fuzzy optimization. 22-34 - Diksha Rangwani, Hari Om:
4F-MAKA: Four-factor mutual authentication and key agreement protocol for internet of things. 35-56 - Volodymyr Kharchenko, Andrii Grekhov:
Traffic simulation and losses estimation in stratospheric drone network. 57-70 - Neng Wan, Yating Luo, Guangping Zeng, Xianwei Zhou:
Minimization of VANET execution time based on joint task offloading and resource allocation. 71-86 - V. C. Diniesh, G. Murugesan:
EEM-MAC: Enhanced energy efficient mobility aware MAC protocol for mobile internet of things. 87-106 - Xiaohui Yang, Wenjie Li, Kai Fan:
A revocable attribute-based encryption EHR sharing scheme with multiple authorities in blockchain. 107-125 - Poonam Tiwari, Sandeep Kumar Gupta, Aruna Pathak:
Field-clustering with sleep awake mechanism with fuzzy in wireless sensor network. 126-141 - Meng Zhao, Yong Ding, Shijie Tang, Hai Liang, Huiyong Wang:
A blockchain-based framework for privacy-preserving and verifiable billing in smart grid. 142-155 - Mu Han, Puyi Xu, Lei Xu, Chungen Xu:
TCA-PEKS: Trusted certificateless authentication public-key encryption with keyword search scheme in cloud storage. 156-169 - Lixia Lin, Wen'an Zhou, Zhicheng Yang, Jianlong Liu:
Deep reinforcement learning-based task scheduling and resource allocation for NOMA-MEC in Industrial Internet of Things. 170-188 - Milad Mohseni, Fatemeh Amirghafouri, Behrouz Pourghebleh:
CEDAR: A cluster-based energy-aware data aggregation routing protocol in the internet of things using capuchin search algorithm and fuzzy logic. 189-209 - S. Kranthi, M. Kanchana, M. Suneetha:
An intelligent intrusion prediction and prevention system for software defined internet of things cloud networks. 210-225 - Jinze Li, Xiaofeng Li, He Zhao, Bin Yu, Tong Zhou, Haotian Cheng, Nianzu Sheng:
MANDALA: A scalable blockchain model with mesh-and-spoke network and H-PBFT consensus algorithm. 226-244 - Xin Liu, Miao Wang, Tanyang Wang, Ruisheng Zhang:
A blockchain assisted multi-gateway authentication scheme for IIoT based on group. 245-259 - Gaurav Tyagi, Rahul Kumar:
Multi-factor user authentication and key agreement scheme for wireless sensor networks using Chinese remainder theorem. 260-276 - Zhaoqi Cai, Jia Wu:
Efficient content transmission algorithm based on multi-community and edge-caching in ICN-SIoT. 277-294 - Yanfei Wang, Kai Zhang, Kejie Lu, Yun Xiong, Mi Wen:
Practical black-box adversarial attack on open-set recognition: Towards robust autonomous driving. 295-311 - Linjian Hong, Kai Zhang, Junqing Gong, Haifeng Qian:
Blockchain-Based Fair Payment for ABE with Outsourced Decryption. 312-327 - Eiman AlNuaimi, Mariam Alsafi, Maitha Alshehhi, Mazin Debe, Khaled Salah, Ibrar Yaqoob, M. Jamal Zemerly, Raja Jayaraman:
Blockchain-based system for tracking and rewarding recyclable plastic waste. 328-346 - Preeti Gupta, Sachin Tripathi, Samayveer Singh, V. S. Gupta:
MPPT-EPO optimized solar energy harvesting for maximizing the WSN lifetime. 347-357 - Chang Xu, Run Yin, Liehuang Zhu, Can Zhang, Kashif Sharif:
Privacy-preserving and fault-tolerant aggregation of time-series data without TA. 358-367 - Erika Rosas, Orlando Andrade, Nicolas Hidalgo:
Effective communication for message prioritization in DTN for disaster scenarios. 368-382 - Ming Luo, Dashi Huang, Minrong Qiu:
An enhanced heterogeneous public key searchable encryption scheme supporting multiple keywords. 383-394 - Frédéric Guidec, Yves Mahéo, Camille Noûs:
Supporting conflict-free replicated data types in opportunistic networks. 395-419 - Jiamou Qi, Yepeng Guan:
Practical Byzantine fault tolerance consensus based on comprehensive reputation. 420-430 - Aditi Sharma, Parmeet Kaur:
Tamper-proof multitenant data storage using blockchain. 431-449 - Tania Taami, Sadoon Azizi, Ramin Yarinezhad:
An efficient route selection mechanism based on network topology in battery-powered internet of things networks. 450-465 - Heng Zhang, Jun Gu, Zhikun Zhang, Linkang Du, Yongmin Zhang, Yan Ren, Jian Zhang, Hongran Li:
Backdoor attacks against deep reinforcement learning based traffic signal control systems. 466-474
Volume 16, Number 2, March 2023
- Changzhen Zhang, Zhanyou Ma, Lin Liu, Yilin Liu:
Modeling & analysis of block generation process of the mining pool in blockchain system. 475-487 - Yiran Yang, Xiqing Liu, Zhifeng Wang, Yiliang Liu:
Dynamic shielding to secure multi-hop communications in vehicular platoons. 488-498 - Melak Ayenew, Hang Lei, Xiaoyu Li, Weizhong Qian, Eyerusalem Abeje, Wenjia Xiang, Abebe Tegene:
Enhancing the performance of permissionless blockchain networks through randomized message-based consensus algorithm. 499-519 - Lei Hang, Israr Ullah, Jun Yang, Chun Chen:
An improved Kalman filter using ANN-based learning module to predict transaction throughput of blockchain network in clinical trials. 520-537 - Chuxin Zhuang, Qingyun Dai, Jiangzhong Cao:
A blockchain shard storage model suitable for multi-view. 538-553 - Hang Shen, Xin Liu, Ning Shi, Tianjing Wang, Guangwei Bai:
Blockchain-enabled solution for secure and scalable V2V video content dissemination. 554-570 - Fangfang Gou, Jia Wu:
Novel data transmission technology based on complex IoT system in opportunistic social networks. 571-588 - Shuwei Qiu, Rong Cao, Haiyan Shi, Jianzhong Li, Yanjun Li:
6WPSN: Reliable and efficient IPv6 packet broadcast protocol for IEEE 802.15.4-based wireless powered sensor networks. 589-605 - Jianlong Liu, Jiaye Wen, Yuhang Xie, Lixia Lin, Wen'an Zhou:
Social-aware D2MD user grouping based on game theory and deep Q-learning. 606-628 - Muhammad Arslan Akram, Adnan Noor Mian, Saru Kumari:
Fog-based low latency and lightweight authentication protocol for vehicular communication. 629-643 - Ming Luo, Dashi Huang, Minrong Qiu:
Cross-domain heterogeneous signcryption with keyword search for wireless body area network. 644-656 - Kuanishbay Sadatdiynov, Laizhong Cui, Joshua Zhexue Huang:
Offloading dependent tasks in MEC-enabled IoT systems: A preference-based hybrid optimization method. 657-674 - Chengzhe Lai, Yinzhen Wang, Hong Wang, Dong Zheng:
A blockchain-based traceability system with efficient search and query. 675-689 - Zhen-Fei Wang, Yong-Wang Ren, Zhong-Ya Cao, Li-Ying Zhang:
LRBFT: Improvement of practical Byzantine fault tolerance consensus protocol for blockchains based on Lagrange interpolation. 690-708 - Chunxin Lin, Ying Li, Manzoor Ahmed, Chenliu Song:
Piece-wise pricing optimization with computation resource constraints for parked vehicle edge computing. 709-726 - Zhe Tu, Huachun Zhou, Kun Li, Haoxiang Song, Wei Quan:
Blockchain-based differentiated authentication mechanism for 6G heterogeneous networks. 727-748 - Zhengyang Ai, Weiting Zhang, Mingyan Li, Pengxiao Li, Lei Shi:
A smart collaborative framework for dynamic multi-task offloading in IIoT-MEC networks. 749-764 - Jorgito Matiuzzi Stocchero, Andre Dexheimer Carneiro, Iulisloi Zacarias, Edison Pignaton de Freitas:
Combining information centric and software defined networking to support command and control agility in military mobile networks. 765-784 - Javid Ali Liakath, Pradeep Krishnadoss, Gobalakrishnan Natesan:
DCCWOA: A multi-heuristic fault tolerant scheduling technique for cloud computing environment. 785-802 - Jian Wang, Shuai Hao, Guosheng Zhao:
CSSA-based collaborative optimization recommendation of users in mobile crowdsensing. 803-817 - Simona-Vasilica Oprea, Adela Bâra:
An Edge-Fog-Cloud computing architecture for IoT and smart metering data. 818-845 - Akanksha Goel, S. Neduncheliyan:
An intelligent blockchain strategy for decentralised healthcare framework. 846-857 - Haibo Wu, Hui Liu, Jun Li:
FabricETP: A high-throughput blockchain optimization solution for resolving concurrent conflicting transactions. 858-875 - Nabanita Das, Souvik Basu, Sipra Das Bit:
OlaRout: Optimal dropbox deployment based cluster routing for post disaster information exchange in a smart city. 876-899 - S. Vidhya, V. Kalaivani:
A blockchain based secure and privacy aware medical data sharing using smart contract and encryption scheme. 900-913 - T. Anusha, Mullur Pushpalatha:
C3P-RPL: A collaborative and proactive approach for optimal peer to peer path selection and sustenance. 914-931 - Md Asif Thanedar, Sanjaya Kumar Panda:
A dynamic resource management algorithm for maximizing service capability in fog-empowered vehicular ad-hoc networks. 932-946 - K. Sridevi, Md Abdul Saifulla:
LBABC: Distributed controller load balancing using artificial bee colony optimization in an SDN. 947-957 - K. Kumaran, E. Sasikala:
An efficient task offloading and resource allocation using dynamic arithmetic optimized double deep Q-network in cloud edge platform. 958-979 - Chuanxin Zhao, Yancheng Yao, Na Zhang, Fulong Chen, Taochun Wang, Yang Wang:
Hybrid scheduling strategy of multiple mobile charging vehicles in wireless rechargeable sensor networks. 980-996 - Jiacheng Hou, Haoye Lu, Amiya Nayak:
A GNN-based proactive caching strategy in NDN networks. 997-1009 - Naveen Chauhan, Rajeev Agrawal, Haider Banka:
Adaptive application offloading for QoS maximization in cloud-fog environment with delay-constraint. 1010-1026 - Sarfaraj Alam Ansari, Kunwar Pal, Prajjval Govil, Mahesh Chandra Govil:
A fuzzy based hierarchical flash crowd controller for live video streaming in P2P network. 1027-1048 - Paruthi Ilam Vazhuthi Padmanaban, Aruchamy Prasanth, Manikandan Shanmugaperumal Periasamy, K. K. Devi Sowndarya:
A hybrid ANFIS reptile optimization algorithm for energy-efficient inter-cluster routing in internet of things-enabled wireless sensor networks. 1049-1068 - Shuo Peng, Kun Liu, Shiji Wang, Yangxia Xiang, Baoxian Zhang, Cheng Li:
Time window-based online task assignment in mobile crowdsensing: Problems and algorithms. 1069-1087 - Seyed Ali Sadati, Mojtaba Shivaie, AmirAli Nazari:
Computationally efficient peer-to-peer energy trading mechanisms for autonomous agents considering network constraints and privacy preservation. 1088-1105 - Saeed Banaeian Far, Maryam Rajabzadeh Asaar, Afrooz Haghbin:
A blockchain-based coin mixing protocol with certificateless signcryption. 1106-1124 - Muhammad Faisal Nadeem, Muhammad Imran, Hafiz Muhammad Afzal Siddiqui, Muhammad Azeem:
Fault tolerance designs of interconnection networks. 1125-1134 - Sreya Ghosh, Iti Saha Misra, Tamal Chakraborty:
Optimal RSU deployment using complex network analysis for traffic prediction in VANET. 1135-1154 - Qaisar Ayub, Sulma Rashid:
Community trend message locking routing protocol for delay tolerant network. 1155-1173 - Mohammad Naderi, Khorshid Mahdaee, Parisa Rahmani:
Hierarchical traffic light-aware routing via fuzzy reinforcement learning in software-defined vehicular networks. 1174-1198 - Rajeev Ranjan, Prabhat Kumar:
Mobility-Enabled Sustainable Data Collection in Wireless Sensor Networks. 1199-1210 - Genhua Lu, Xiaofeng Jia, Yi Zhang, Jun Shao, Guiyi Wei:
A domain name management system based on account-based consortium blockchain. 1211-1226 - R. Barona, E. Baburaj:
An efficient DDoS attack detection and categorization using adolescent identity search-based weighted SVM model. 1227-1241 - Lingyu Lu, Jing Yu, Haifeng Du, Xiang Li:
A3C-based load-balancing solution for computation offloading in SDN-enabled vehicular edge computing networks. 1242-1256 - Yanjun Liu, Hongwei Li, Xinyuan Qian, Meng Hao:
ESA-FedGNN: Efficient secure aggregation for federated graph neural networks. 1257-1269 - Junbin Liang, Qiong Huang, Jianye Huang, Liantao Lan, Man Ho Allen Au:
An identity-based traceable ring signatures based on lattice. 1270-1285 - Wenjie Zhao, Yu Wang, Wenbin Zhai, Liang Liu, Yulei Liu:
Efficient time-delay attack detection based on node pruning and model fusion in IoT networks. 1286-1309 - P. Arulprakash, A. Suresh Kumar, S. Poorna Prakash:
Optimal route and cluster head selection using energy efficient-modified African vulture and modified mayfly in manet. 1310-1326
Volume 16, Number 3, May 2023
- Yu Wang, Wenyong Wang, Youlu Zeng, Ting Yang:
GradingShard: A new sharding protocol to improve blockchain throughput. 1327-1339 - Anmulin Wu, Yajun Guo, Yimin Guo:
A decentralized lightweight blockchain-based authentication mechanism for Internet of Vehicles. 1340-1353 - Yuxia Fu, Jun Shao, Qingjia Huang, Qihang Zhou, Huamin Feng, Xiaoqi Jia, Ruiyi Wang, Wenzhi Feng:
Non-transferable blockchain-based identity authentication. 1354-1364 - Egide Nkurunziza, Fagen Li:
HAP-SG: Heterogeneous authentication protocol for smart grid. 1365-1379 - Princy Victor, Arash Habibi Lashkari, Rongxing Lu, Tinshu Sasi, Pulei Xiong, Shahrear Iqbal:
IoT malware: An attribute-based taxonomy, detection mechanisms and challenges. 1380-1431 - Kai Fan, Zeyu Shi, Yicen Yang, Liyang Bai, Yintang Yang, Kan Yang, Hui Li:
Blockchain-based cloud-edge clock calibration in IoT. 1432-1444 - Pooja Choksy, Akhil Chaurasia, Udai Pratap Rao, Sonu Kumar:
Attribute based access control (ABAC) scheme with a fully flexible delegation mechanism for IoT healthcare. 1445-1467 - Zhibin Liu, Yuhan Liu, Yuxia Lei, Zhenyou Zhou, Xinshui Wang:
ARLO: An asynchronous update reinforcement learning-based offloading algorithm for mobile edge computing. 1468-1480 - Jigyasa Chadha, Aarti Jain, Yogesh Kumar:
Satellite imagery-based Airbus ship localization and detection using deep learning-based approaches. 1481-1498 - Seyed Salar Sefati, Mehrdad Abdi, Ali Ghaffari:
QoS-based routing protocol and load balancing in wireless sensor networks using the markov model and the artificial bee colony algorithm. 1499-1512 - Prarthana J. Mehta, Balu L. Parne, Sankita J. Patel:
SE-LAKAF: Security enhanced lightweight authentication and key agreement framework for smart grid network. 1513-1535 - Guosheng Zhao, Xiao Wang, Jian Wang, Jia Liu:
Task recommendation for mobile crowd sensing system based on multi-view user dynamic behavior prediction. 1536-1550 - Shengzhou Hu, Wenhao Li, Tingting Zhong, Hua He:
An innovative key agreement protocol with complex attribute authentication based on blockchain. 1551-1569 - Changzhen Zhang, Zhanyou Ma, Lin Liu, Yilin Liu:
Correction to: Modeling & analysis of block generation process of the mining pool in blockchain system. 1570 - S. Kranthi, M. Kanchana, M. Suneetha:
Correction: An intelligent intrusion prediction and prevention system for software defined internet of things cloud networks. 1571 - M. Sudha, V. P. Galdis pushparathi:
Editorial Expression of Concern: Traffic sign detection and recognition using RGSM and a novel feature extraction method. 1572 - Retraction Note: RFDCAR: Robust failure node detection and dynamic congestion aware routing with network coding technique for wireless sensor network. 1573
- Retraction Note: SPAHN novel approach for PL-AG gateway discovery for internet connectivity. 1574
- Retraction Note: Machine learning based multi scale parallel K-means + + clustering for cloud assisted internet of things. 1575
- Retraction Note: Improved multi objective data transmission using conventional route selection algorithm in mobile ad hoc network. 1576
- Retraction Note: Defense model for preserving the wind turbine records in cloud using fog computing with coupling based cryptography. 1577
- Retraction Note: Secure access control for manufacturing sector with application of ethereum blockchain. 1578
- Retraction Note: Delay sensitive aware distributed data fault recognition algorithm for distributed sensor networks. 1579
- Retraction Note: Data transmission and real-time information acquisition based on fine-grained algorithm and wireless network. 1580
- Retraction Note: Energy efficient topology management scheme based on clustering technique for software defined wireless sensor network. 1581
Volume 16, Number 4, August 2023
- Du Chen, Deyun Gao, Lu Jin, Wei Quan, Hongke Zhang:
ADAS: Adaptive Delay-Aligned Scheduling for Multipath Transmission in Heterogeneous Wireless Networks. 1583-1595 - Xuewen He, Kaihua Cao:
LoRa network communication protocol based on location and time planning. 1596-1608 - Vijay Rayar, Udaykumar Naik, Prabhakar S. Manage:
A RSS-based path loss model approaches multi-dimensional scaling to localize 2D sensor nodes in WSN. 1609-1623 - Nour El Houda Bourebia, Chunlin Li:
A novel raccoon optimization algorithm with multi-objective clustering strategy based routing protocol for WSNs. 1624-1640 - Peiyan Yuan, Zhao Han, Xiaoyan Zhao:
Integrating the edge intelligence technology into image composition: A case study. 1641-1651 - Tao Li, Yali Liu, Jianting Ning:
SDRLAP: A secure lightweight RFID mutual authentication protocol based on PUF with strong desynchronization resistance. 1652-1667 - Zijia Wang, Baoxian Zhang, Yangxia Xiang, Cheng Li:
Joint task assignment and path planning for truck and drones in mobile crowdsensing. 1668-1679 - Jie Yin, Chuntang Zhang, Wenwei Xie, Guangjun Liang, Lanping Zhang, Guan Gui:
Anomaly traffic detection based on feature fluctuation for secure industrial internet of things. 1680-1695 - Junlu Wang, Su Li, Wanting Ji, Dong Li, Baoyan Song:
A composite blockchain associated event traceability method for financial activities. 1696-1715 - Shengchen Duan, Hong Liu, Lize Gu:
A searchable encryption scheme with hidden search pattern and access pattern on distributed cloud system. 1716-1738 - Suguna Paramasivam, R. Leela Velusamy:
Quality of service aware routing in software defined video streaming: a survey. 1739-1760 - Anu Monisha A, T. R. Reshmi, Krishnan Murugan:
ERNSS-MCC: Efficient relay node selection scheme for mission critical communication using machine learning in VANET. 1761-1784 - Morteza Adeli, Nasour Bagheri, Sadegh Sadeghi, Saru Kumari:
χperbp: a cloud-based lightweight mutual authentication protocol. 1785-1802 - Feng Zeng, Ranran Rou, Qi Deng, Jinsong Wu:
Parked vehicles crowdsourcing for task offloading in vehicular edge computing. 1803-1818 - R. Sarath Kumar, P. Sampath, M. Ramkumar:
Enhanced Elman Spike Neural Network fostered intrusion detection framework for securing wireless sensor network. 1819-1833 - Xiaoyan Hu, Weicheng Zhou, Jun Yin, Guang Cheng, Shen Yan, Hua Wu:
Towards verifiable and privacy-preserving account model on a consortium blockchain based on zk-SNARKs. 1834-1851 - Deepak Choudhary, Roop Pahuja:
A blockchain-based cyber-security for connected networks. 1852-1867 - Bidisha Bhabani, Judhistir Mahapatro:
TRP: A TOPSIS-based RSU-enabled priority scheduling scheme to disseminate alert messages of WBAN sensors in hybrid VANETs. 1868-1886 - Guosheng Zhao, Cai Ren, Jian Wang, Yuyan Huang, Huan Chen:
IoT intrusion detection model based on gated recurrent unit and residual network. 1887-1899 - Elham Ebrahimpour, Shahram Babaie:
A Lightweight authentication approach based on linear feedback shift register and majority function for internet of things. 1900-1915 - Faezeh Alizadeh, Amir Jalaly Bidgoly:
Bit flipping attack detection in low power wide area networks using a deep learning approach. 1916-1926 - Bei Yu, Libo Feng, Hongyu Zhu, Fei Qiu, Ji Wan, Shaowen Yao:
MeHLDT: A multielement hash lock data transfer mechanism for on-chain and off-chain. 1927-1943 - Jia Liu, Jian Wang, Yuping Yan, Guosheng Zhao:
A task allocation method based on data fusion of multimodal trajectory in mobile crowd sensing. 1944-1958 - Duraimurugan Samiayya, S. Radhika, A. Chandrasekar:
An optimal model for enhancing network lifetime and cluster head selection using hybrid snake whale optimization. 1959-1974 - Ravi Raushan Kumar Chaudhary, Kakali Chatterjee:
A Lightweight PUF based Multi-factor Authentication Technique for Intelligent Smart Healthcare System. 1975-1992 - Sivanandam Sivamohan, S. S. Sridhar, Sivamohan Krishnaveni:
TEA-EKHO-IDS: An intrusion detection system for industrial CPS with trustworthy explainable AI and enhanced krill herd optimization. 1993-2021
Volume 16, Number 5, September 2023
- Mian Guo, Chengyuan Xu, Mithun Mukherjee:
RIS-assisted device-edge collaborative edge computing for industrial applications. 2023-2038 - Junyan Chen, Xuefeng Huang, Yong Wang, Hongmei Zhang, Cenhuishan Liao, Xiaolan Xie, Xinmei Li, Wei Xiao:
ASTPPO: A proximal policy optimization algorithm based on the attention mechanism and spatio-temporal correlation for routing optimization in software-defined networking. 2039-2057 - Yu Gao, Jun Tao, Haotian Wang, Zuyan Wang, Dika Zou, Yifan Xu:
Benefit-oriented task offloading in UAV-aided mobile edge computing: An approximate solution. 2058-2072 - Bin Zhao, Jiqun Zhang, Cao Wei, Li Bin, Wenyin Zhang, Yilong Gao:
A dynamic evaluation model of data price based on game theory. 2073-2088 - S. Nagadivya, R. Manoharan:
Energy efficient fuzzy logic prediction-based opportunistic routing protocol (EEFLPOR) for wireless sensor networks. 2089-2102 - Peiyue Jiang, Chengye Zheng, Qinchun Ke, Xiaobo Gu:
Robust cooperative localization using peer-to-peer ranging measurements. 2103-2112 - Antony Prince John, Jagadhiswaran Devaraj, Lathaselvi Gandhimaruthian, Javid Ali Liakath:
Swarm learning based credit scoring for P2P lending in block chain. 2113-2130 - B. Naresh Kumar, Jai Sukh Paul Singh:
Development of multi-objective cognitive radio network with energy harvesting for medical data transmission. 2131-2152 - Jay Nagarajan, Pegah Mansourian, Muhammad Anwar Shahid, Arunita Jaekel, Ikjot Saini, Ning Zhang, Marc Kneppers:
Machine Learning based intrusion detection systems for connected autonomous vehicles: A survey. 2153-2185 - Soni Chaurasia, Kamal Kumar:
ACRA: Adaptive meta-heuristic based Clustering and Routing Algorithm for IoT-assisted wireless sensor network. 2186-2201 - Yanyan Duan, Fenghua Huang, Lingwei Xu, T. Aaron Gulliver:
Intelligent spectrum sensing algorithm for cognitive internet of vehicles based on KPCA and improved CNN. 2202-2217 - Dawei Xu, Jiaqi Gao, Liehuang Zhu, Feng Gao, Yang Han, Jian Zhao:
B-Tor: Anonymous communication system based on consortium blockchain. 2218-2241 - Xiaopeng Yu, Jie Feng, Wei Zhao, Haomiao Yang, Dianhua Tang:
Peer-to-peer privacy-preserving vertical federated learning without trusted third-party coordinator. 2242-2255 - Irshad Ullah, Xiaoheng Deng, Xinjun Pei, Ping Jiang, Husnain Mushtaq:
A verifiable and privacy-preserving blockchain-based federated learning approach. 2256-2270 - Yan Wang, Yuxin Gong, Huikang Yang:
A mobile localization algorithm based on fuzzy estimation for serious NLOS scenes. 2271-2289 - Gopal Singh Rawat, Karan Singh:
A bayesian-based distributed trust management scheme for connected vehicles' security. 2290-2306 - S. Nikkath Bushra, Nalini Subramanian, A. Chandrasekar:
An optimal and secure environment for intrusion detection using hybrid optimization based ResNet 101-C model. 2307-2324 - Sanaa Kaddoura, Ramzi A. Haraty, Sultan Al Jahdali, Maram Assi:
SDODV: A smart and adaptive on-demand distance vector routing protocol for MANETs. 2325-2348 - Xiaohong Zhang, Jiaming Lai, Ata Jahangir Moshayedi:
Traffic data security sharing scheme based on blockchain and traceable ring signature for VANETs. 2349-2366 - K. Swapna Sudha, N. Jeyanthi:
Merkle hash tree improved strongly constrained discrete hashing function-based authentication scheme for enabling security for smart home IoT applications. 2367-2379 - P. Deepavathi, C. Mala:
IMDRPL: Identifying and eliminating malicious devices using DIO and DAO ICMP control messages in RPL-based protocol. 2380-2398 - Xueyan Liu, Linpeng Li, Ruirui Sun, Wenjing Li, Tao Liu:
Lightweight multi-departmental data sharing scheme based on consortium blockchain. 2399-2414 - Jhong-Ting Lou, Showkat Ahmad Bhat, Nen-Fu Huang:
Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system. 2415-2437 - Khuong Ho-Van:
Jammer selection for energy harvesting-aided non-orthogonal multiple access: Performance analysis. 2438-2455 - P. Sheela Rani, S. Baghavathi Priya:
A block chain-based approach using proof of continuous work consensus algorithm to secure the educational records. 2456-2473 - Shuangrong Peng, Xiaohu Tang, Ling Xiong, Hui Zhu:
LGAAFS: A lightweight group anonymous mutual authentication and forward security scheme for wireless body area networks. 2474-2491 - Weiyou Liang, Yujue Wang, Yong Ding, Haibin Zheng, Hai Liang, Huiyong Wang:
An efficient blockchain-based anonymous authentication and supervision system. 2492-2511 - S. Ambareesh, H. C. Kantharaju, M. Sakthivel:
A novel Fuzzy TOPSIS based hybrid jarratt butterfly optimization for optimal routing and cluster head selection in WSN. 2512-2524 - Raghav, Nitish Andola, S. Venkatesan, Shekhar Verma:
Privacy-preserving cloud data sharing for healthcare systems with hybrid blockchain. 2525-2547 - Bshisht Moony, Amit K. Barnwal, Mrityunjay Singh, Dheerendra Mishra:
Quantum secure two party authentication protocol for mobile devices. 2548-2559 - Gobalakrishnan Natesan, Manikandan Nanjappan, Pradeep Krishnadoss, L. Sherly Puspha Annabel:
Task scheduling based on minimization of makespan and energy consumption using binary GWO algorithm in cloud environment. 2560-2573 - Ruizhong Du, Chenghao Yu, Mingyue Li:
Enabling efficient and verifiable secure search on cloud-based encrypted big data. 2574-2590 - Yangyang Jiang, Yepeng Guan:
A cluster reputation-based hierarchical consensus model in blockchain. 2591-2606 - S. Madhavi, Ramalingam Praveen, N. Jagadish Kumar, S. M. Udhaya Sankar:
Hybrid Grey PIPRECIA and Grey OCRA method-based dynamic multi-criteria decision-making model for mitigating non-cooperating node attacks in WSNs. 2607-2629 - Xinyu Yi, Yuping Zhou, Yuqian Lin, Ben Xie, Junjie Chen, Chenye Wang:
Digital rights management scheme based on redactable blockchain and perceptual hash. 2630-2648 - Xiaohua Wu, Fangjian Yu, Jing Wang, Jinpeng Chang, Xueqi Feng:
Bpf-payment: Fair payment for cloud computing with privacy based on blockchain and homomorphic encryption. 2649-2666
Volume 16, Number 6, November 2023
- Jian Chen, Kaili Zhai, Jie Jia, An Du, Yi Xue, Xingwei Wang:
Online resource allocation for QoE optimization in CoMP-assisted eMBMS system. 2667-2680 - Bing Tang, Shaifeng Zheng, Qing Yang:
Joint optimization of energy and delay for computation offloading in vehicular edge computing. 2681-2695 - V. Krishnakumar, R. Asokan:
Block chain based trusted distributed routing scheme using optimized dropout ensemble extreme learning neural network in MANET. 2696-2713 - Sai Srinivas Vellela, R. Balamanigandan:
An intelligent sleep-awake energy management system for wireless sensor network. 2714-2731 - Haohua Zhu, Rongxin Guo, Wenxian Jiang, Bolun Pan:
Blockchain-based technology for commerce data management using reputation algorithm with QoS mechanism. 2732-2746 - R. Prabha, G. A. Senthil, SU. Suganthi:
Cluster head based secure routing using optimized dual-discriminator conditional generative adversarial network in wireless ad-hoc networks. 2747-2760 - Jingting Xue, Lingjie Shi, Liang Liu, Xiaojun Zhang, Fagen Li:
Anonymity-enhancing decentralized protocol for coin mixing based on ring signatures and key derivation. 2761-2774 - Guosheng Zhao, Huan Chen, Jian Wang:
A lightweight block encryption algorithm for narrowband internet of things. 2775-2793 - Meena Rao, Parul Chaudhary, Kavita Sheoran, Geetika Dhand:
A secure routing protocol using hybrid deep regression based trust evaluation and clustering for mobile ad-hoc network. 2794-2810 - Shakira Musa Baig, Muhammad Umar Javed, Ahmad Almogren, Nadeem Javaid, Mohsin Jamil:
A blockchain and stacked machine learning approach for malicious nodes' detection in internet of things. 2811-2832 - Ruchi Garg, Tarun Gulati, Sumit Kumar:
Wormhole attack detection and recovery for secure range free localization in large-scale wireless sensor networks. 2833-2849 - Rui Han, Yu Wang, Mingfa Wan, Teng Yuan, Guozi Sun:
FIBPRO: Peer-to-peer data management and sharing cloud storage system based on blockchain. 2850-2864 - Xianzhong Tian, Pengcheng Xu, Yifan Shen, Yuheng Shao:
Joint DNN partitioning and resource allocation for completion rate maximization of delay-aware DNN inference tasks in wireless powered mobile edge computing. 2865-2878 - Jianshan Zhang, Ming Li, Bing Lin, Katinka Wolter:
Joint optimization of IoT devices access and bandwidth resource allocation for network slicing in edge-enabled radio access networks. 2879-2891 - Yihan Kong, Jing Li, Ting Xiong, Tao Xie:
EVONChain: a bi-tiered public blockchain network architecture. 2892-2914 - Zhen-Fei Wang, Shi-Qi Liu, Pu Wang, Li-Ying Zhang:
BW-PBFT: Practical byzantine fault tolerance consensus algorithm based on credit bidirectionally waning. 2915-2928 - Behnam Mohammad Hasani Zade, Mohammad Masoud Javidi, Najme Mansouri:
An improved Caledonian crow learning algorithm based on ring topology for security-aware workflow scheduling in cloud computing. 2929-2984 - Tania Saleem, Muhammad Ismaeel, Muhammad Umar Janjua, Abdulrahman Ali, Awab Aqib, Ali Ahmed, Saeed-Ul Hassan:
Predicting functional roles of Ethereum blockchain addresses. 2985-3002 - Murat Karakus, Evrim Guler, Suleyman Uludag:
Smartcontractchain (SC2): Cross-ISP QoS traffic management framework with SDN and blockchain. 3003-3020 - Monica Bhutani, Brejesh Lall, Monika Agrawal:
A novel energy-efficient adaptive superframe structure for OWC-based real-time bio-sensor networks. 3021-3031 - Fei Yan, Hongbin Luo, Shan Zhang, Zhiyuan Wang, Peng Lian:
A comparative study of IP-based and ICN-based link-state routing protocols in LEO satellite networks. 3032-3046
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.