default search action
Peer-to-Peer Networking and Applications, Volume 11
Volume 11, Number 1, January 2018
- Fan Wu, Lili Xu, Saru Kumari, Xiong Li:
An improved and provably secure three-factor user authentication scheme for wireless sensor networks. 1-20 - Zhixin Liu, Shiyi Li, Xinping Guan, Kit Yan Chan:
A robust power control scheme for femtocell networks with probability constraint of channel gains. 21-33 - Maede Ashouri-Talouki:
An efficient privacy-preserving P2P protocol for computing maximum value in the presence of active adversaries. 34-43 - Shakeel Ahmad, Christos Bouras, Eliya Buyukkaya, Muneeb Dawood, Raouf Hamzaoui, Vaggelis Kapoulas, Andreas Papazois, Gwendal Simon:
Peer-to-peer live video streaming with rateless codes for massively multiplayer online games. 44-62 - Lidong Han, Xiao Tan, Shengbao Wang, Xikun Liang:
An efficient and secure three-factor based authenticated key exchange scheme using elliptic curve cryptosystems. 63-73 - Nahid Amirazodi, Ali Mohammad Saghiri, Mohammad Reza Meybodi:
An adaptive algorithm for super-peer selection considering peer's capacity in mobile peer-to-peer networks based on learning automata. 74-89 - Jia Wu, Zhigang Chen:
Sensor communication area and node extend routing algorithm in opportunistic networks. 90-100 - Editor's note: From M2M to IoT: Platform, Network and Service. 101
- Peiyan Yuan, Chenyang Wang:
OPPO: An optimal copy allocation scheme in mobile opportunistic networks. 102-109 - Gang Wang, Tanhui Liu:
Resource allocation for M2M-enabled cellular network using Nash bargaining game theory. 110-123 - Gang Li, Bin He, Aimin Du:
A traffic congestion aware vehicle-to-vehicle communication framework based on Voronoi diagram and information granularity. 124-138 - Jaeho Kim, Sung-Chan Choi, Jaeseok Yun, Jang-Won Lee:
Towards the oneM2M standards for building IoT ecosystem: Analysis, implementation and lessons. 139-151 - Illsoo Sohn, Sang Won Yoon, Sang Hyun Lee:
Distributed scheduling using belief propagation for internet-of-things (IoT) networks. 152-161 - Amit Kumar Gupta, Jyotsna Kumar Mandal, Indrajit Bhattacharya, Tamal Mondal, Sourav Sanu Shaw:
CTMR-collaborative time-stamp based multicast routing for delay tolerant networks in post disaster scenario. 162-180 - Sun-Hyun Kim, Seung-Jae Han:
Delay-tolerant sensing data delivery for IoT network by using signal strength information. 181-197 - Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chien-Ming Chen:
Towards secure authenticating of cache in the reader for RFID-based IoT systems. 198-208
Volume 11, Number 2, March 2018
- Editor's note: Special Issue on Security and Privacy for Big Data Storage in the Cloud. 209
- Yixian Yang, Xinxin Niu, Lixiang Li, Haipeng Peng, Jingfeng Ren, Haochun Qi:
General Theory of security and a study of hacker's behavior in big data era. 210-219 - Geeta Sharma, Sheetal Kalra:
Identity based secure authentication scheme based on quantum key distribution for cloud computing. 220-234 - Yujue Wang, Qianhong Wu, Bo Qin, Xiaofeng Chen, Xinyi Huang, Jungang Lou:
Ownership-hidden group-oriented proofs of storage from pre-homomorphic signatures. 235-251 - Weidong Qiu, Bozhong Liu, Can Ge, Lingzhi Xu, Xiaoming Tang, Guozhen Liu:
Protecting lightweight block cipher implementation in mobile big data computing - A GPU-based approach. 252-264 - Tingting Yang, Hailong Feng, Chengming Yang, Ruilong Deng, Ge Guo, Tieshan Li:
Resource allocation in cooperative cognitive radio networks towards secure communications for maritime big data systems. 265-276 - Hermine Hovhannisyan, Wen Qi, Kejie Lu, Rongwei Yang, Jianping Wang:
Whispers in the cloud storage: A novel cross-user deduplication-based covert channel design. 277-286 - Yinbin Miao, Jianfeng Ma, Ximeng Liu, Zhiquan Liu, Limin Shen, Fushan Wei:
VMKDO: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner. 287-297 - Huige Wang, Kefei Chen, Yu Long, Junyao Ye, Liangliang Wang:
A new randomized message-locked encryption in the standard model. 298-308 - Junjie Yang, Gengqiang Huang, Chunjuan Wei:
Privacy-aware electricity scheduling for home energy management system. 309-317 - Weichao Ding, Chunhua Gu, Fei Luo, Yaohui Chang, Ulysse Rugwiro, Xiaoke Li, Geng Wen:
DFA-VMP: An efficient and secure virtual machine placement strategy under cloud environment. 318-333 - Xiaoxia Liu, Hui Zhu, Rongxing Lu, Hui Li:
Efficient privacy-preserving online medical primary diagnosis scheme on naive bayesian classification. 334-347
Volume 11, Number 3, May 2018
- Yinbin Miao, Jianfeng Ma, Ximeng Liu, Zhiquan Liu, Junwei Zhang, Fushan Wei:
DOAS: Efficient data owner authorized search over encrypted cloud data. 349-360 - Chao Sha, Jian-mei Qiu, Shuyan Li, Meng-ye Qiang, Ruchuan Wang:
A type of energy-efficient data gathering method based on single sink moving along fixed points. 361-379 - Mohammad Alishahi, Mohammad Hossein Yaghmaee Moghaddam, Hamid Reza Pourreza:
Multi-class routing protocol using virtualization and SDN-enabled architecture for smart grid. 380-396 - Mohamed Amine Rguibi, Najem Moussa:
The impact of hesitation on passive worm spreading in P2P networks. 397-408 - Rohit Verma, Abhishek Srivastava:
A dynamic web service registry framework for mobile environments. 409-430 - Nabila Chergui, M. Tahar Kechadi, Salim Chikhi:
Scalability-aware mechanism based on workload prediction in ultra-peer networks. 431-449 - Nitin Sharma, Souryendu Das:
Social fairness and channel loading effects in peer-to-peer connected networks. 450-461 - Sachula Meng, Ying Wang, Zhongyu Miao, Kai Sun:
Joint optimization of wireless bandwidth and computing resource in cloudlet-based mobile cloud computing environment. 462-472 - XinDi Ma, Jianfeng Ma, Hui Li, Qi Jiang, Sheng Gao:
AGENT: an adaptive geo-indistinguishable mechanism for continuous location-based service. 473-485 - Hela Mliki, Lamia Chaari, Lotfi Kamoun:
Modelling and evaluation of QCN using coloured petri nets. 486-503 - Ye Liu, Chenglin Fan, Hao Liu, Qing Yang, Shaoen Wu:
Cross-layer cooperative multichannel medium access for internet of things. 504-517 - Michele Amoretti, Francesco Zanichelli:
P2P-PL: A pattern language to design efficient and robust peer-to-peer systems. 518-547 - Shibin Wang, Nianmin Yao, Ning Gong, Zhenguo Gao:
A trigger-based pseudonym exchange scheme for location privacy preserving in VANETs. 548-560 - Ahmed Ibrahim Mohammed Saleh, Hesham Arafat, Amr M. Hamed:
An Adaptive hybrid routing strategy (AHRS) for mobile ad hoc networks. 561-578 - Manaf Zghaibeh:
O-Torrent: A fair, robust, and free riding resistant P2P content distribution mechanism. 579-591 - Zhihong Rao, Weina Niu, Xiaosong Zhang, Hongwei Li:
Tor anonymous traffic identification based on gravitational clustering. 592-601 - Leila Mechtri, Fatiha Djemili Tolba, Salim Ghanemi:
An optimized intrusion response system for MANET: - An attack-severity aware approach. 602-618 - Xianfu Meng:
sureTrust: a super peer-aware trust model for 2-level P2P networks. 619-631 - Andrei V. Gurtov, Joakim Koskela, Dmitry G. Korzun:
Cyclic ranking in single-resource peer-to-peer exchange. 632-643 - Ngoc-Tu Nguyen, Chin-Chen Chang:
Untraceable biometric-based three-party authenticated key exchange for dynamic systems. 644-663
Volume 11, Number 4, July 2018
- Jiannong Cao, Jingde Cheng, Jianhua Ma, Ju Ren:
Guest editorial: special issue on transparent computing. 665-667 - Yuezhi Zhou, Wenjuan Tang, Di Zhang, Xiang Lan, Yaoxue Zhang:
A case for software-defined code scheduling based on transparent computing. 668-678 - Jiaze Wang, Anfeng Liu, Tong Yan, Zhiwen Zeng:
A resource allocation model based on double-sided combinational auctions for transparent computing. 679-696 - Zhipu Xie, Weifeng Lv, Linfang Qin, Bowen Du, Runhe Huang:
An evolvable and transparent data as a service framework for multisource data integration and fusion. 697-710 - Yayuan Tang, Kehua Guo, Biao Tian:
A block-level caching optimization method for mobile transparent computing. 711-722 - Kai Fan, Wei Wang, Wei Jiang, Hui Li, Yintang Yang:
Secure ultra-lightweight RFID mutual authentication protocol based on transparent computing for IoV. 723-734 - Hongzi Zhu, Tom H. Luan, Mianxiong Dong, Peng Cheng:
Guest editorial: fog computing on wheels. 735-737 - Yuanguo Bi:
Neighboring vehicle-assisted fast handoff for vehicular fog communications. 738-748 - Ting Lu, Shan Chang, Wei Li:
Fog computing enabling geographic routing for urban area vehicular network. 749-755 - Wanru Xu, Panlong Yang, Lijing Jiang:
Connection is power: Near optimal advertisement infrastructure placement for vehicular fogs. 756-765 - Kai Fan, Junxiong Wang, Xin Wang, Hui Li, Yintang Yang:
Secure, efficient and revocable data sharing scheme for vehicular fogs. 766-777 - Jiahao Zhang, Qiang Li, Xiaoqi Wang, Bo Feng, Dong Guo:
Towards fast and lightweight spam account detection in mobile social networks through fog computing. 778-792 - Tongxiang Wang, Xianglin Wei, Chaogang Tang, Jianhua Fan:
Efficient multi-tasks scheduling algorithm in mobile cloud computing with time constraints. 793-807 - Tingting Yang, Zhengqi Cui, Rui Wang, Jian Zhao, Zhou Su, Ruilong Deng:
A multi-vessels cooperation scheduling for networked maritime fog-ran architecture leveraging SDN. 808-820
Volume 11, Number 5, September 2018
- Chengzhe Lai, Wenlong Guo, Yafei Li, Dong Zheng:
SEIP: Secure and seamless IP communications for group-oriented machine to machine communications. 821-836 - Dongqing Xu, Shu Zhang, Jianhua Chen, Mimi Ma:
A provably secure anonymous mutual authentication scheme with key agreement for SIP using ECC. 837-847 - Basil AsSadhan, Abdulmuneem Bashaiwth, Jalal Al-Muhtadi, Saleh AlShebeili:
Analysis of P2P, IRC and HTTP traffic for botnets detection. 848-861 - Jingjing Guo, Jianfeng Ma, Xinxin Guo, Xinghua Li, Junwei Zhang, Tao Zhang:
Trust-based service composition and selection in service oriented architecture. 862-880 - Tao Wang, Zheng Yao, Baoxian Zhang, Cheng Li, Kun Hao:
Adaptive Flow Rate Control for Network Utility Maximization Subject to QoS Constraints in Wireless Multi-hop Networks. 881-899 - Venkatasamy Sureshkumar, Ruhul Amin, Anitha Ramalingam:
A robust mutual authentication scheme for session initiation protocol with key establishment. 900-916 - Hezhe Wang, Huiqiang Wang, Guangsheng Feng, Hongwu Lv:
NWBBMP: a novel weight-based buffer management policy for DTN routing protocols. 917-923 - Fengyong Li, Mi Wen, Jingsheng Lei, Yanli Ren:
Efficient steganographer detection over social networks with sampling reconstruction. 924-939 - Yazhou Yuan, Zhixin Liu, Jinle Wang, Xinping Guan:
Dynamic power allocation based on second-order control system in two-tier femtocell networks. 940-954 - Qiyi Han, Hong Wen, Fang Miao:
Rumor spreading in interdependent social networks. 955-965 - Shanshan Ge, Peng Zeng, Rongxing Lu, Kim-Kwang Raymond Choo:
FGDA: Fine-grained data analysis in privacy-preserving smart grid communications. 966-978 - Ruo Mo, Jianfeng Ma, Ximeng Liu, Hai Liu:
EOABS: expressive outsourced attribute-based signature. 979-988 - Xiaofei Liao, Song Guo, Deze Zeng, Kun Wang:
Guest editorial: Special issue on big data networking. 989-991 - Kai Fan, Shuyang Lou, Ruidan Su, Hui Li, Yintang Yang:
Secure and private key management scheme in big data networking. 992-999 - Lechan Yang, Zhihao Qin:
Distributed correlation model mining from remote sensing big data based on gene expression programming. 1000-1011 - Qiongjie Yao, Xiaofei Liao, Hai Jin:
Training deep neural network on multiple GPUs with a model averaging method. 1012-1021 - Jie Cui, Lili Shao, Hong Zhong, Yan Xu, Lu Liu:
Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks. 1022-1037 - Xiao Liu, Gaoxiang Li, Shigeng Zhang, Anfeng Liu:
Big program code dissemination scheme for emergency software-define wireless sensor networks. 1038-1059 - Fei Chen, Haitao Li, Jiangchuan Liu, Bo Li, Ke Xu, Yuemin Hu:
Migrating big video data to cloud: a peer-assisted approach for VoD. 1060-1074 - Fei Chen, Detian Zhang, Jian Zhang, Xiaofeng Wang, Lifang Chen, Yuan Liu, Jiangchuan Liu:
Distribution-aware cache replication for cooperative road side units in VANETs. 1075-1084 - Zhenfei Wang, Liying Zhang, Zhiyun Zheng, Junfeng Wang:
Energy balancing RPL protocol with multipath for wireless sensor networks. 1085-1100 - Jingyu Zhang, Zhi-Jie Wang, Zhe Quan, Jian Yin, Yuanyi Chen, Minyi Guo:
Optimizing power consumption of mobile devices for video streaming over 4G LTE networks. 1101-1114 - Bin Xu, Jin Qi, Xiaoxuan Hu, Kwong-Sak Leung, Yanfei Sun, Yu Xue:
Self-adaptive bat algorithm for large scale cloud manufacturing service composition. 1115-1128 - Wenzhuo Li, Chuang Lin:
FTLLS: A fault tolerant, low latency, distributed scheduling approach based on sparrow. 1129-1140 - Linchen Yu, Jigang Cao, Mianlong Chen, Xinyue Cui:
Key frame extraction scheme based on sliding window and features. 1141-1152
Volume 11, Number 6, November 2018
- Sun-Moon Jo, Jungsoo Han:
Convergence P2P cloud computing. 1153-1155 - B. Firdaus Begam, J. Satheeshkumar, Gyoo-Soo Chae:
Optimized peer to peer QSPR prediction of enthalpy of formation using outlier detection and subset selection. 1156-1165 - Jungpil Shin, Zhaofeng Liu, Cheol Min Kim, Hyung-Jin Mun:
Writer identification using intra-stroke and inter-stroke information for security enhancements in P2P systems. 1166-1175 - Seokhoon Kim, Dae-Young Kim:
Efficient data-forwarding method in delay-tolerant P2P networking for IoT services. 1176-1185 - Yoon-Su Jeong, Seung-Soo Shin:
Fast Fourier transform based efficient data processing technique for big data processing speed enhancement in P2P computing environment. 1186-1196 - Youngseok Lee, Jungwon Cho:
RFID-based sensing system for context information management using P2P network architecture. 1197-1205 - JunWeon Yoon, Taeyoung Hong, JangWon Choi, ChanYeol Park, Ki-Bong Kim, HeonChang Yu:
Evaluation of P2P and cloud computing as platform for exhaustive key search on block ciphers. 1206-1216 - YunJae Jang, JaMee Kim, WonGyu Lee:
Development and application of internet of things educational tool based on peer to peer network. 1217-1229 - Cheol-Joo Chae, Han-Jin Cho:
Enhanced secure device authentication algorithm in P2P-based smart farm system. 1230-1239 - Hyeong-Seok Kim, Seung-Taek Oh, Jae-Hyun Lim:
Development of local area alert system against particulate matters and ultraviolet rays based on open IoT platform with P2P. 1240-1251 - Hyoung-Jai Kim, Bong-Hyun Kim:
Implementation of young children English education system by AR type based on P2P network service model. 1252-1264 - Bong-Hyun Kim, Dong-Il Kim:
Development of disaster prevention solution in extremely dangerous industrial environment based on P2P sensor network. 1265-1277 - Joo-Chang Kim, Kyungyong Chung:
Mining health-risk factors using PHR similarity in a hybrid P2P network. 1278-1287 - GilSang Yoo, Hyeoncheol Kim, Sungdae Hong:
Implementation of convergence P2P information retrieval system from captured video frames. 1288-1298 - Donghyeok Lee, Namje Park, Geonwoo Kim, Seunghun Jin:
De-identification of metering data for smart grid personal security in intelligent CCTV-based P2P cloud computing environment. 1299-1308 - Hyun Yoo, Kyungyong Chung:
Mining-based lifecare recommendation using peer-to-peer dataset and adaptive decision feedback. 1309-1320
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.