Journal: Peer-to-Peer Networking and Applications

Volume 13, Issue 6

1853 -- 1871G. S. Binu, B. Shajimohan. A novel heuristic based energy efficient routing strategy in wireless sensor network
1872 -- 1885Balamurugan N, J. Raja 0001, R. Pitchai. Multicriteria dragonfly graph theory based resource optimized virtual network mapping technique for home medical care service provisioning in cloud
1886 -- 1902Ali Seyfollahi, Ali Ghaffari. Reliable data dissemination for the Internet of Things using Harris hawks optimization
1903 -- 1904Ali Seyfollahi, Ali Ghaffari. Correction to: Reliable data dissemination for the internet of things using Harris hawks optimization
1905 -- 1920A. Prasanth, S. Jayachitra. A novel multi-objective optimization strategy for enhancing quality of service in IoT-enabled WSN applications
1921 -- 1930A. G. Sreedevi, T. Rama Rao. SINR based association algorithm for indoor device-to-device communication networks
1931 -- 1942Saeideh Gholamrezazadeh Motlagh, Jelena V. Misic, Vojislav B. Misic. An analytical model for churn process in Bitcoin network with ordinary and relay nodes
1943 -- 1966R. Shashidhara, Sriramulu Bojjagani, Anup Kumar Maurya, Saru Kumari, Hu Xiong. A Robust user authentication protocol with privacy-preserving for roaming service in mobility environments
1967 -- 1989Nikita Bhagatkar, Kapil Dolas, Ratan K. Ghosh, Sajal K. Das 0001. An integrated P2P framework for E-learning
1990 -- 2000K. Karthika Lekshmi, M. Vigilson Prem. Multi-keyword score threshold and B+ tree indexing based top-K query retrieval in cloud
2001 -- 2010K. Sumathi, P. Pandiaraja. Dynamic alternate buffer switching and congestion control in wireless multimedia sensor networks
2011 -- 2022S. K. Sathya Lakshmi Preetha, R. Dhanalakshmi 0001, P. Mohamed Shakeel. An intelligent approach for energy efficient trajectory design for mobile sink based IoT supported wireless sensor networks
2023 -- 2035S. K. Mydhili, S. Periyanayagi, S. Baskar, P. Mohamed Shakeel, P. R. Hariharan. Machine learning based multi scale parallel K-means++ clustering for cloud assisted internet of things
2036 -- 2052L. Maria Michael Visuwasam, D. Paul Raj. A distributed intelligent mobile application for analyzing travel big data analytics
2053 -- 2064T. Gobinath, A. Tamilarasi. RFDCAR: Robust failure node detection and dynamic congestion aware routing with network coding technique for wireless sensor network
2065 -- 2077C. Ajitha, T. Jaya. Cognitive radio technology with reduced PAPR and complexity for IoT-based OFDM networks
2078 -- 2088Hongzhuo Qi. Fuzzy logic hybridized artificial intelligence for computing and networking on internet of things platform
2089 -- 2098R. P. Premanand, A. Rajaram. Enhanced data accuracy based PATH discovery using backing route selection algorithm in MANET
2099 -- 2111R. Elavarasan, K. Chitra. An efficient fuzziness based contiguous node refining scheme with cross-layer routing path in WSN
2112 -- 2122Tamizharasi Thirugnanam, Muhammad Rukunuddin Ghalib. A reward based connectivity-aware IoV neighbor selection for improving reliability in healthcare information exchange
2123 -- 2134BalaAnand Muthu, C. B. Sivaparthipan, Gunasekaran Manogaran, Revathi Sundarasekar, Seifedine Kadry, A. Shanthini, A. Antony Dasel. IOT based wearable sensor for diseases prediction and symptom analysis in healthcare sector
2135 -- 2144B. Satheesh Monikandan, A. Sivasubramanian, S. P. K. Babu, Prasanna Venkatesan G. K. D, C. Arunachalaperumal. Channel aware optimized proportional fair scheduler for LTE downlink
2145 -- 2154G. B. Santhi, D. Sheela. Reliability refinement in VANET with hybrid jamming attacks using novel index based voting algorithm
2155 -- 2165Appanpillai Agasthian, Rajendra Pamula, L. A. Kumaraswamidhas. Defense model for preserving the wind turbine Records in Cloud Using fog Computing with coupling based cryptography
2166 -- 2176Bo Wang, Tianyu Fan, Xiangtian Nie. Advanced delay assured numerical heuristic modelling for peer to peer project management in cloud assisted internet of things platform
2177 -- 2188Jabash Samuel G. K, J. Jasper. MANFIS based SMART home energy management system to support SMART grid
2189 -- 2200A. S. Anshad, R. Radhakrishnan. Improved network lifetime to identify unexploited PATH using series cornerstone PATH algorithm in wireless sensor networks
2201 -- 2213Xiang Wu, Huanhuan Wang, Wei Tan, Dashun Wei, Minyu Shi. Dynamic allocation strategy of VM resources with fuzzy transfer learning method
2214 -- 2223Zhou Zhou, Hongmin Wang, Huailing Shao, Lifeng Dong, Junyang Yu. A high-performance scheduling algorithm using greedy strategy toward quality of service in the cloud environments
2224 -- 2233Zhou Zhou, Zhuopeng Xiao, Weihong Deng. Improved community structure discovery algorithm based on combined clique percolation method and K-means algorithm
2234 -- 2236Hongwei Li 0001, Rongxing Lu, Mohamed M. E. A. Mahmoud. Security and privacy of machine learning assisted P2P networks
2237 -- 2250Yi Zhang, Hequn Xian, Aimin Yu. CSNN: Password guessing method based on Chinese syllables and neural network
2251 -- 2259Guangkai Ma, Chunpeng Ge, Lu Zhou 0002. Achieving reliable timestamp in the bitcoin platform
2260 -- 2271Zhaohui Wei, Qingqi Pei, Xuefeng Liu, Lichuan Ma. Efficient distributed privacy-preserving collaborative outlier detection
2272 -- 2284Youwen Zhu, Xingxin Li. Privacy-preserving k-means clustering with local synchronization in peer-to-peer networks
2285 -- 2299Qian Wang 0015, Zhipeng Gao, Zifan Li, Xiaojiang Du, Mohsen Guizani. An optimal uplink traffic offloading algorithm via opportunistic communications based on machine learning
2300 -- 2323Yingying Ren, Zhiwen Zeng, Tian Wang 0001, Shaobo Zhang, Guoming Zhi. A trust-based minimum cost and quality aware data collection scheme in P2P network
2324 -- 2333Huijuan Lian, Weidong Qiu, Di Yan, Zheng Huang, Peng Tang. Efficient and secure k-nearest neighbor query on outsourced data
2334 -- 2341Huige Wang, Kefei Chen, Yuan Zhang 0006, Yunlei Zhao. Functional encryption with application to machine learning: simple conversions from generic functions to quadratic functions
2342 -- 2355Haoyang Wang, Kai Fan, Hui Li 0006, Yintang Yang. A dynamic and verifiable multi-keyword ranked search scheme in the P2P networking environment
2356 -- 2366Xiaoyuan Liu, Hongwei Li 0001, Guowen Xu, Rongxing Lu, Miao He. Adaptive privacy-preserving federated learning

Volume 13, Issue 5

1297 -- 1311Maryam Zare, Seyed Hossein Khasteh, Saeid Ghafouri. Automatic ICA detection in online social networks with PageRank
1312 -- 1326Baowen Xie, Guosheng Zhao, Mianxing Chao, Jian Wang. A prediction model of cloud security situation based on evolutionary functional network
1327 -- 1339Zhixin Liu 0001, Xiaopin Li, Yazhou Yuan, Xinping Guan. Power control of D2D communication based on quality of service assurance under imperfect channel information
1340 -- 1356SungJin Yu, Kisung Park, YoHan Park, HyungPyo Kim, Youngho Park 0005. A lightweight three-factor authentication protocol for digital rights management system
1357 -- 1374Samayveer Singh. An energy aware clustering and data gathering technique based on nature inspired optimization in WSNs
1375 -- 1393Ankita Srivastava, Arun Prakash, Rajeev Tripathi. An adaptive intersection selection mechanism using ant Colony optimization for efficient data dissemination in urban VANET
1394 -- 1405Ilker Ɯnal. Integration of ZigBee based GPS receiver to CAN network for precision farming applications
1406 -- 1422Ahmad Karami, Nahideh Derakhshanfard. RPRTD: Routing protocol based on remaining time to encounter nodes with destination node in delay tolerant network using artificial neural network
1423 -- 1441Amir Hassani Karbasi, Siyamak Shahpasand. A post-quantum end-to-end encryption over smart contract-based blockchain for defeating man-in-the-middle and interception attacks
1442 -- 1456Yunhai Guo, Rui Lv, Zhengxiang Li. A realized on-demand cross-layer connection strategy for wireless self-organization link based on WLAN
1457 -- 1473Rui Wang, Faezeh Hajiaghajani, Subir Biswas. Device-to-device streaming video caching for cellular download cost reduction
1474 -- 1485Zibin Ren, Ting Lu, Xin Wang, Wenjing Guo, Guohua Liu, Shan Chang. Resource scheduling for delay-sensitive application in three-layer fog-to-cloud architecture
1486 -- 1504Yuqi Fan, JingLin Zou, Siyu Liu, Qiran Yin, Xin Guan, Xiaohui Yuan 0001, Weili Wu, Ding-Zhu Du. A blockchain-based data storage framework: A rotating multiple random masters and error-correcting approach
1505 -- 1525Henry Nunoo-Mensah, Kwame Osei Boateng, James Dzisi Gadze. PSTRM: Privacy-aware sociopsychological trust and reputation model for wireless sensor networks
1526 -- 1538Farooque Hassan Kumbhar, Navrati Saxena, Abhishek Roy 0001. Social Reliable D2D Relay for Trustworthy Paradigm in 5G Wireless Networks
1539 -- 1566Zainab Hassan Ali, Mahmoud Mohammed Badawy, Hesham A. Ali. A novel geographically distributed architecture based on fog technology for improving Vehicular Ad hoc Network (VANET) performance
1567 -- 1576Jiale Wu, Mi Wen, Rongxing Lu, Beibei Li, Jinguo Li. Toward efficient and effective bullying detection in online social network
1577 -- 1599Micael Pedrosa, AndrĆ© ZĆŗquete, Carlos Costa. RAIAP: renewable authentication on isolated anonymous profiles
1600 -- 1615Shibin Wang, Kele Mao, Furui Zhan, Dong Liu. Hybrid conditional privacy-preserving authentication scheme for VANETs
1616 -- 1628Mahdi Tahavori, Farokhlagha Moazami. Lightweight and secure PUF-based authenticated key agreement scheme for smart grid
1629 -- 1642Haseeb Ur Rahman, Madjid Merabti, David Llewellyn-Jones, Sud Sudirman, Anwar Ghani. Structuring communities for sharing human digital memories in a social P2P network
1643 -- 1655Hui Zheng, Jun Shao, Guiyi Wei. Attribute-based encryption with outsourced decryption in blockchain
1656 -- 1671Kamlesh Kumar Rana, Sachin Tripathi, Ram Shringar Raw. Link reliability-based multi-hop directional location routing in vehicular ad hoc network
1672 -- 1687Oluwafolake Ojo, Cyril O. Iyadi, Ayodeji Oluwatope, Adio T. Akinwale. AyoPeer: The adapted ayo-game for minimizing free riding in peer-assisted network
1688 -- 1703Yohei Nishi, Masahiro Sasabe, Shoji Kasahara. Optimality analysis of locality-aware tit-for-tat-based P2P file distribution
1704 -- 1705Deyu Zhang, Mianxiong Dong, Geyong Min. Editorial: Emerging Trends on Data Analytics at the Network Edge
1706 -- 1719Jian Li, Daqian Shi, Piyaporn Tumnark, Hao Xu. A system for real-time intervention in negative emotional contagion in a smart classroom deployed under edge computing service infrastructure
1720 -- 1743Haojun Teng, Kaoru Ota, Anfeng Liu, Tian Wang 0001, Shaobo Zhang. Vehicles joint UAVs to acquire and analyze data for topology discovery in large-scale IoT systems
1744 -- 1755Xiaoheng Deng, Jin Liu, LeiLei Wang, Zhihui Zhao. A trust evaluation system based on reputation data in Mobile edge computing network
1756 -- 1766Ying Chen 0010, Shuang Chen, Xin Chen 0018. Efficient caching strategy in wireless networks with mobile edge computing
1767 -- 1775Hongran Li, Weiwei Xu, Heng Zhang 0001, Jian Zhang, Yi Liu. Polynomial regressors based data-driven control for autonomous underwater vehicles
1776 -- 1787Jiwei Huang, Songyuan Li, Ying Chen. Revenue-optimal task scheduling and resource management for IoT batch jobs in mobile edge computing
1788 -- 1798Jiajia Xie, Jun Luo 0006, Yan Peng, Shaorong Xie, Huayan Pu, Xiaomao Li, Zhou Su, Yuan Liu, Rui Zhou. Data driven hybrid edge computing-based hierarchical task guidance for efficient maritime escorting with multiple unmanned surface vehicles
1799 -- 1813Guangsheng Feng, Yue Wang, Bingyang Li, Yafei Li, Hongwu Lv, Chengbo Wang, Zihan Gao, Huiqiang Wang. A near-optimal content placement in D2D underlaid cellular networks
1814 -- 1829Zhufang Kuang, Gongqiang Li, Libang Zhang, Huibin Zhou, Changyun Li, Anfeng Liu. Energy Efficient Mode Selection, Base Station Selection and Resource Allocation Algorithm in D2D Heterogeneous Networks
1830 -- 1838Yanjun Peng, Peng Liu 0027, Tingting Fu. Performance analysis of edge-PLCs enabled industrial Internet of things
1839 -- 1852Genghua Yu, Jia Wu 0002. Content caching based on mobility prediction and joint user Prefetch in Mobile edge networks

Volume 13, Issue 4

1071 -- 1079S. Famila, A. Jawahar, Sariga Arjunan, K. Shankar. Improved artificial bee colony optimization based clustering algorithm for SMART sensor environments
1080 -- 1090J. Kirubakaran, Prasanna Venkatesan G. K. D, K. Sampath Kumar, S. Dhanabal, K. Baskar. Delay sensitive aware distributed data fault recognition algorithm for distributed sensor networks
1091 -- 1101J. Wilson, Kamalraj Subramaniam. Improved multi objective data transmission using conventional route selection algorithm in mobile ad hoc network
1102 -- 1108P. K. Poonguzhali, N. P. Ananthamoorthy. Improved energy efficient WSN using ACO based HSA for optimal cluster head selection
1109 -- 1119A. Arokiaraj Jovith, S. V. Kasmir Raja, A. Razia Sulthana. Interference mitigation and optimal hop distance measurement in distributed homogenous nodes over wireless sensor network
1120 -- 1130Wei Xu, Jing Leng. Data transmission and real-time information acquisition based on fine-grained algorithm and wireless network
1131 -- 1141Lithungo Murry, R. Kumar, Themrichon Tuithung, P. Mohamed Shakeel. A local decision making technique for reliable service discovery using D2D communications in disaster recovery networks
1142 -- 1151Brindha Palanisamy, Senthilkumar Athappan. Data dependability based bimodal encryption scheme for distributed routing in wireless sensor networks
1152 -- 1175Sivadi Balakrishna, M. Thirumaran, R. Padmanaban, Vijender Kumar Solanki. An efficient incremental clustering based improved K-Medoids for IoT multivariate data cluster analysis
1176 -- 1184Mingchuan Zhang, Xin Wang, Tingting Liu, Junlong Zhu, Qingtao Wu. AFSndn: A novel adaptive forwarding strategy in named data networking based on Q-learning
1185 -- 1192Nagendranath M. V. S. S, A. Ramesh Babu. An efficient mobility aware stable and secure clustering protocol for mobile ADHOC networks
1193 -- 1203Sulin Pang, Junkun Yang. Social reputation loss model and application to lost-linking borrowers in a internet financial platform
1204 -- 1214V. Rama Krishna, R. Subhashini. Mimicking attack by botnet and detection at gateway
1215 -- 1224Fengzhen Jiang, Jie Zhang, Xu Zhao. Research on the influence mechanism of resettlers participation in migrant work in the context of relationship network
1225 -- 1235Rui Hou, Huan Liu, Yang Hu, YunHao Zhao. Research on secure transmission and storage of energy IoT information based on Blockchain
1236 -- 1247Lin Chang 0001, Songhao Piao, Leng Xiaokun 0001, Hu Yunqiang, Wende Ke. Study on falling backward of humanoid robot based on dynamic multi objective optimization
1248 -- 1259S. Suseela, R. Eswari, S. Nickolas, M. Saravanan. QoS optimization through PBMR algorithm in multipath wireless multimedia sensor networks
1260 -- 1271Sheng Jin, Yu Gao, Liang Chen. Improved Deep Distance Learning for Visual Loop Closure Detection in Smart City
1272 -- 1283Ping Xie, Jianghui Liu, Gaoyuan Zhang, Ling Xing, Honghai Wu. Opportunistic TPSR cooperative spectrum sharing protocol with secondary user selection for 5G wireless network
1284 -- 1296Haibo Liang, Xin Qin, Jianchong Gao, Muhammad Junaid Khan. Research on detector signal receiving network layout optimization model

Volume 13, Issue 3

729 -- 741Songai Xuan, Dohyeun Kim. Development of Cloud of Things Based on Proxy Using OCF IoTivity and MQTT for P2P Internetworking
742 -- 751Pavan Kumar C. 0001, Selvakumar R.. Reliable and secure data communication in wireless sensor networks using optimal locally recoverable codes
752 -- 761C. Umarani, S. Kannan. Intrusion detection system using hybrid tissue growing algorithm for wireless sensor network
762 -- 779Garima Singh, Deepti D. Shrimankar. Secure & efficient intra-MME handovers via mobile relays within the LTE-A and future 5G high-speed train networks
780 -- 795Hassan Harb, Chady Abou Jaoude, Abdallah Makhoul. An energy-efficient data prediction and processing approach for the internet of things and sensing based applications
796 -- 815Walid Osamy, Ahmed El-Sawy, Ahmed M. Khedr. Effective TDMA scheduling for tree-based data collection using genetic algorithm in wireless sensor networks
816 -- 824Seyed Farhad Aghili, Hamid Mala. Tracking and impersonating tags in a CRC-based ultralightweight RFID authentication protocol
825 -- 849Elahe Khatibi, Mohsen Sharifi, Seyedeh Leili Mirtaheri. DPAS: A dynamic popularity-aware search mechanism for unstructured P2P systems
850 -- 871Nadine Boudargham, Jacques Bou Abdo, Jacques Demerjian, Christophe Guyeux, Abdallah Makhoul. Performance of low level protocols in high traffic wireless body sensor networks
872 -- 889Saeed Saeedvand, Hadi S. Aghdasi, Leili Mohammad Khanli. Novel Distributed Dynamic Backbone-based Flooding in Unstructured Networks
890 -- 904Ganesan Sangeetha, Muthuswamy Vijayalakshmi, Sannasi Ganapathy, Arputharaj Kannan. An improved congestion-aware routing mechanism in sensor networks using fuzzy rule sets
905 -- 931Ashika R. Naik, Bettahally N. Keshavamurthy. Next level peer-to-peer overlay networks under high churns: a survey
932 -- 939UmaMaheswari Gurusamy, K. Hariharan, M. S. K. Manikandan. Path optimization of box-covering based routing to minimize average packet delay in software defined network
940 -- 947Jia Wu 0002, Zhigang Chen 0001, Ming Zhao 0007. Community recombination and duplication node traverse algorithm in opportunistic social networks
948 -- 964Naserali Noorani, Seyed-Amin Hosseini-Seno. SDN- and fog computing-based switchable routing using path stability estimation for vehicular ad hoc networks
965 -- 986A. Samson Arun Raj, Yogesh Palanichamy. An aerial intelligent relay-road side unit (AIR-RSU) framework for modern intelligent transportation system
987 -- 1001Ayyasamy Ayyanar, Eanoch Golden Julie, Yesudhas Harold Robinson, Subramanian Balaji, Raghvendra Kumar 0001, Le Hoang Son, Pham Huy Thong, Ishaani Priyadarshini. AVRM: adaptive void recovery mechanism to reduce void nodes in wireless sensor networks
1002 -- 1013Peng Hu, Yongli Wang, Bei Gong, Yongjian Wang, Yanchao Li, Ruxin Zhao, Hao Li, Bo Li. A secure and lightweight privacy-preserving data aggregation scheme for internet of vehicles
1014 -- 1025Lili Jiang, Xiaolin Chang, Yuhang Liu, Jelena V. Misic, Vojislav B. Misic. Performance analysis of Hyperledger Fabric platform: A hierarchical model approach
1026 -- 1037Wenjing Hou, Yixin Jiang, WenXin Lei, Aidong Xu, Hong Wen, Songling Chen. A P2P network based edge computing smart grid model for efficient resources coordination
1038 -- 1045Sandosh S., Govindasamy V., Akila G.. Enhanced intrusion detection system via agent clustering and classification based on outlier detection
1046 -- 1068Maha S. Abdelhaq, Raed A. Alsaqour, Abeer Algarni, Maali Alabdulhafith, Mahmoud A. Alawi, Aqeel Taha, Baraa T. Sharef, Mustafa Tariq. Human immune-based model for intrusion detection in mobile ad hoc networks
1069 -- 0Jia Xu 0003, Wei Lu, Lijie Xu, Dejun Yang, Tao Li 0001. Correction to: Incentive mechanisms for mobile crowd sensing based on supply-demand relationship
1070 -- 0Chunguang Zhang, Guangping Zeng, Hongbo Wang, Xuyan Tu. Correction to: Hierarchical resource scheduling method using improved cuckoo search algorithm for internet of things

Volume 13, Issue 2

425 -- 0. Editor's note: Special issue on internet of things system technologies based on quality of experience
426 -- 438Cheng-Ta Huang. A scheme of flexible and reversible information-hiding in SMVQ mechanism
439 -- 474Fatma Merabet, Amina Cherif, Malika Belkadi, Olivier Blazy, Emmanuel Conchon, Damien Sauveron. New efficient M2C and M2M mutual authentication protocols for IoT-based healthcare applications
475 -- 488Dongsik Son, Seungpyo Huh, TaeJin Lee, Jin Kwak. Internet of things system technologies based on quality of experience
489 -- 513Hangi Kim, Myungseo Park, Jaehyung Cho, Jihun Kim, Jongsung Kim. Weaknesses of some lightweight blockciphers suitable for IoT systems and their applications in hash modes
514 -- 523Chi-Yao Weng. DWT-based reversible information hiding scheme using prediction-error-expansion in multimedia images
524 -- 531Jun Woo Kim, Soo-Kyun Kim. Interactive job sequencing system for small make-to-order manufacturers under smart manufacturing environment
532 -- 547Masood Ahmad, Ataul Aziz Ikram, Ishtiaq Wahid, Fasee Ullah, Awais Ahmad 0001, Fakhri Alam Khan. Optimized clustering in vehicular ad hoc networks based on honey bee and genetic algorithm for internet of things
548 -- 563Huaiying Sun, Huiqun Yu, Guisheng Fan, Liqiong Chen. Energy and time efficient task offloading and resource allocation on the generic IoT-fog-cloud architecture
564 -- 573Serim Kang, Soram Kim, Jongsung Kim. Forensic analysis for IoT fitness trackers and its application
574 -- 0. Editor's Note: Special issue on P2P Computing for Intelligence of Things
575 -- 578SunMoon Jo, Jieun Lee, Jungsoo Han, Supratip Ghose. P2P computing for intelligence of things
579 -- 589Sunghyuck Hong. P2P networking based internet of things (IoT) sensor node authentication by Blockchain
590 -- 600N. Noor Alleema, D. Siva Kumar. Volunteer nodes of ant colony optimization routing for minimizing delay in peer to peer MANETs
601 -- 609Dae-Young Kim 0005, Ahyoung Lee, Seokhoon Kim. P2P computing for trusted networking of personalized IoT services
610 -- 622Kyungyong Chung, Roy C. Park. P2P-based open health cloud for medicine management
623 -- 634Doohee Han, Myeongyun Cho. Selective switching dual-transmission scheme in multi-LED Hybrid VLC-P2P networking system
635 -- 646Jungpil Shin, Md. Rashedul Islam, Md Abdur Rahim, Hyung-Jin Mun. Arm movement activity based user authentication in P2P systems
647 -- 658P. Uma Maheswari, T. R. Ganeshbabu. Repetitive node categorization technique based reliable clustering and energy efficient communication in P2P wireless sensor network
659 -- 670Yong-Young Kim, Yong-Ki Kim 0003, Dae-Sik Kim, Mi Hye Kim. Implementation of hybrid P2P networking distributed web crawler using AWS for smart work news big data
671 -- 683YongJoo Lee, Keon-Myung Lee, Sang Ho Lee. Blockchain-based reputation management for custom manufacturing service in the peer-to-peer networking environment
684 -- 693Sun Park, ByungRea Cha, Kyungyong Chung, JongWon Kim. Mobile IoT device summarizer using P2P web search engine and inherent characteristic of contents
694 -- 703Kyungyong Chung, Hyun Yoo. Edge computing health model using P2P-based deep neural networks
704 -- 716Manh Tien, Yoon Young Park, Kang-Hee Jung, Se Yeob Kim, Joong-Eup Kye. Performance evaluation on the accuracy of the semantic map of an autonomous robot equipped with P2P communication module
717 -- 728B. Priya, T. Gnanasekaran. To optimize load of hybrid P2P cloud data-center using efficient load optimization and resource minimization algorithm

Volume 13, Issue 1

1 -- 15Libo Jiao, Hao Yin, Dongchao Guo, Haojun Huang, Qin Gao. Resource allocation in two-tier small-cell networks with energy consumption constraints
16 -- 26Cong Zhang, Hsin-Hung Cho, Chi-Yuan Chen. Emergency-level-based healthcare information offloading over fog network
27 -- 37Luis Rodrigues, Joel Guerreiro, NoƩlia Correia. RELOAD/CoAP architecture for the federation of wireless sensor networks
38 -- 52Fei Gu, Jianwei Niu 0002, Xin Jin, Shui Yu. FDFA: A fog computing assisted distributed analytics and detecting system for family activities
53 -- 63Hong Wang 0017, Jianhua Li, Chengzhe Lai, Zhe Wang. A provably secure aggregate authentication scheme for unmanned aerial vehicle cluster networks
64 -- 81Weimin Li, Bin Wang 0017, Jinfang Sheng, Xiangyu Hou, Lin Chen, Jiaguang Liu. A software defined caching framework based on user access behavior analysis for transparent computing server
82 -- 103R. Madhusudhan, Shashidhara. Mobile user authentication protocol with privacy preserving for roaming service in GLOMONET
104 -- 122Dadmehr Rahbari, Mohsen Nickray. Task offloading in mobile fog computing by classification and regression tree
123 -- 136Jie Wang, Fei Dai, Jie Yang 0027, Guan Gui. Efficient combination policies for diffusion adaptive networks
137 -- 150Michal Boron, Jerzy Brzezinski, Anna Kobusinska. P2P matchmaking solution for online games
151 -- 162Runkai Yang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic. Performance Modeling of Linux Network System with Open vSwitch
163 -- 174Ata Ullah, Ghawar Said, Muhammad Sher, Huansheng Ning. Fog-assisted secure healthcare data aggregation scheme in IoT-enabled WSN
175 -- 189Xianfu Meng, Ge Zhang. TrueTrust: a feedback-based trust management model without filtering feedbacks in P2P networks
190 -- 206Shilpa Budhkar, Venkatesh Tamarapalli. An overlay management strategy to improve QoS in CDN-P2P live streaming systems
207 -- 218Maryam Zarezadeh, Hamid Mala, Maede Ashouri-Talouki. Multi-keyword ranked searchable encryption scheme with access control for cloud storage
219 -- 242Muhammad Salman Raheel, Raad Raad. Energy efficient technique for P2P multisource video streaming in mobile ad hoc networks to improve QoE
243 -- 254Masahiro Sasabe. Topological influence on optimality of Tit-for-Tat based P2P content distribution
255 -- 268Jian Wu, Zhigang Chen 0001, Jia Wu 0002, Xiao Liu, Genghua Yu, Yedong Zhao. An energy efficient data transmission approach for low-duty-cycle wireless sensor networks
269 -- 286Peng Zheng, Hongxiao Fei, Yeqing Yan. An effective positive transmission routing algorithm based on social relationships in opportunistic social networks
287 -- 303Dongchao Ma, Guangxing Han, Hongchao Li, Li Ma, Chengan Zhao. A parallel optimization for energy and robustness of file distribution services
304 -- 319B. Guru Prakash, C. Balasubramanian, R. Sukumar. An approach by adopting multi-objective clustering and data collection along with node sleep scheduling for energy efficient and delay aware WSN
320 -- 332Amr Elsaadany, Khalid Khalil. Assessment of coverage quality of sensor networks for IoT applications
333 -- 347Monali Mavani, Krishna Asawa. Resilient against spoofing in 6LoWPAN networks by temporary-private IPv6 addresses
348 -- 367Gaurav Srivastava, Richa Agrawal, Kunwar Singh, Rajeev Tripathi, Kshirasagar Naik. A hierarchical identity-based security for delay tolerant networks using lattice-based cryptography
368 -- 387Xiaogang Qi, Min Qiang, Lifang Liu 0001. A balanced strategy to improve data invulnerability in structured P2P system
388 -- 411Sneha Kanchan, Garima Singh, Narendra S. Chaudhari. EASPSC: Efficient authentication of SignRecryption protocol using shareable clouds in VANET groups
412 -- 423Hassan Mahdikhani, Rasoul Shahsavarifar, Rongxing Lu, David Bremner. Achieve privacy-preserving simplicial depth query over collaborative cloud servers