Peer-to-Peer Networking and Applications, Volume 16 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 16, Number 1, January 2023

Sanjeev Kumar Dwivedi
, Ruhul Amin
, Satyanarayana Vollala:
Smart contract and IPFS-based trustworthy secure data storage and device authentication scheme in fog computing environment. 1-21

Srivel Ravi
, Saravanan Matheswaran
, Uma Perumal, Shanthi Sivakumar, Srinivas Kumar Palvadi
:
Adaptive trust-based secure and optimal route selection algorithm for MANET using hybrid fuzzy optimization. 22-34

Diksha Rangwani
, Hari Om:
4F-MAKA: Four-factor mutual authentication and key agreement protocol for internet of things. 35-56

Volodymyr Kharchenko
, Andrii Grekhov
:
Traffic simulation and losses estimation in stratospheric drone network. 57-70

Neng Wan
, Yating Luo, Guangping Zeng
, Xianwei Zhou:
Minimization of VANET execution time based on joint task offloading and resource allocation. 71-86

V. C. Diniesh
, G. Murugesan:
EEM-MAC: Enhanced energy efficient mobility aware MAC protocol for mobile internet of things. 87-106

Xiaohui Yang, Wenjie Li
, Kai Fan:
A revocable attribute-based encryption EHR sharing scheme with multiple authorities in blockchain. 107-125

Poonam Tiwari
, Sandeep Kumar Gupta, Aruna Pathak
:
Field-clustering with sleep awake mechanism with fuzzy in wireless sensor network. 126-141

Meng Zhao, Yong Ding
, Shijie Tang, Hai Liang, Huiyong Wang:
A blockchain-based framework for privacy-preserving and verifiable billing in smart grid. 142-155

Mu Han, Puyi Xu, Lei Xu
, Chungen Xu:
TCA-PEKS: Trusted certificateless authentication public-key encryption with keyword search scheme in cloud storage. 156-169

Lixia Lin
, Wen'an Zhou
, Zhicheng Yang, Jianlong Liu:
Deep reinforcement learning-based task scheduling and resource allocation for NOMA-MEC in Industrial Internet of Things. 170-188

Milad Mohseni, Fatemeh Amirghafouri, Behrouz Pourghebleh
:
CEDAR: A cluster-based energy-aware data aggregation routing protocol in the internet of things using capuchin search algorithm and fuzzy logic. 189-209

S. Kranthi
, M. Kanchana
, M. Suneetha
:
An intelligent intrusion prediction and prevention system for software defined internet of things cloud networks. 210-225

Jinze Li, Xiaofeng Li, He Zhao
, Bin Yu
, Tong Zhou
, Haotian Cheng, Nianzu Sheng:
MANDALA: A scalable blockchain model with mesh-and-spoke network and H-PBFT consensus algorithm. 226-244

Xin Liu, Miao Wang, Tanyang Wang, Ruisheng Zhang
:
A blockchain assisted multi-gateway authentication scheme for IIoT based on group. 245-259

Gaurav Tyagi
, Rahul Kumar:
Multi-factor user authentication and key agreement scheme for wireless sensor networks using Chinese remainder theorem. 260-276

Zhaoqi Cai, Jia Wu:
Efficient content transmission algorithm based on multi-community and edge-caching in ICN-SIoT. 277-294

Yanfei Wang, Kai Zhang
, Kejie Lu, Yun Xiong, Mi Wen:
Practical black-box adversarial attack on open-set recognition: Towards robust autonomous driving. 295-311

Linjian Hong, Kai Zhang
, Junqing Gong, Haifeng Qian:
Blockchain-Based Fair Payment for ABE with Outsourced Decryption. 312-327

Eiman AlNuaimi, Mariam Alsafi, Maitha Alshehhi, Mazin Debe, Khaled Salah, Ibrar Yaqoob
, M. Jamal Zemerly
, Raja Jayaraman:
Blockchain-based system for tracking and rewarding recyclable plastic waste. 328-346

Preeti Gupta, Sachin Tripathi, Samayveer Singh, V. S. Gupta:
MPPT-EPO optimized solar energy harvesting for maximizing the WSN lifetime. 347-357

Chang Xu
, Run Yin, Liehuang Zhu, Can Zhang, Kashif Sharif
:
Privacy-preserving and fault-tolerant aggregation of time-series data without TA. 358-367

Erika Rosas, Orlando Andrade, Nicolas Hidalgo:
Effective communication for message prioritization in DTN for disaster scenarios. 368-382

Ming Luo, Dashi Huang, Minrong Qiu:
An enhanced heterogeneous public key searchable encryption scheme supporting multiple keywords. 383-394

Frédéric Guidec
, Yves Mahéo
, Camille Noûs:
Supporting conflict-free replicated data types in opportunistic networks. 395-419

Jiamou Qi, Yepeng Guan:
Practical Byzantine fault tolerance consensus based on comprehensive reputation. 420-430

Aditi Sharma
, Parmeet Kaur
:
Tamper-proof multitenant data storage using blockchain. 431-449

Tania Taami, Sadoon Azizi, Ramin Yarinezhad:
An efficient route selection mechanism based on network topology in battery-powered internet of things networks. 450-465

Heng Zhang, Jun Gu
, Zhikun Zhang, Linkang Du, Yongmin Zhang, Yan Ren, Jian Zhang
, Hongran Li:
Backdoor attacks against deep reinforcement learning based traffic signal control systems. 466-474
Volume 16, Number 2, March 2023

Changzhen Zhang
, Zhanyou Ma, Lin Liu, Yilin Liu:
Modeling & analysis of block generation process of the mining pool in blockchain system. 475-487

Yiran Yang, Xiqing Liu, Zhifeng Wang, Yiliang Liu:
Dynamic shielding to secure multi-hop communications in vehicular platoons. 488-498

Melak Ayenew
, Hang Lei, Xiaoyu Li
, Weizhong Qian, Eyerusalem Abeje, Wenjia Xiang, Abebe Tegene:
Enhancing the performance of permissionless blockchain networks through randomized message-based consensus algorithm. 499-519

Lei Hang, Israr Ullah, Jun Yang, Chun Chen:
An improved Kalman filter using ANN-based learning module to predict transaction throughput of blockchain network in clinical trials. 520-537

Chuxin Zhuang, Qingyun Dai, Jiangzhong Cao:
A blockchain shard storage model suitable for multi-view. 538-553

Hang Shen
, Xin Liu, Ning Shi, Tianjing Wang, Guangwei Bai:
Blockchain-enabled solution for secure and scalable V2V video content dissemination. 554-570

Fangfang Gou, Jia Wu:
Novel data transmission technology based on complex IoT system in opportunistic social networks. 571-588

Shuwei Qiu, Rong Cao, Haiyan Shi, Jianzhong Li, Yanjun Li:
6WPSN: Reliable and efficient IPv6 packet broadcast protocol for IEEE 802.15.4-based wireless powered sensor networks. 589-605

Jianlong Liu, Jiaye Wen, Yuhang Xie, Lixia Lin, Wen'an Zhou
:
Social-aware D2MD user grouping based on game theory and deep Q-learning. 606-628

Muhammad Arslan Akram, Adnan Noor Mian, Saru Kumari
:
Fog-based low latency and lightweight authentication protocol for vehicular communication. 629-643

Ming Luo, Dashi Huang, Minrong Qiu:
Cross-domain heterogeneous signcryption with keyword search for wireless body area network. 644-656

Kuanishbay Sadatdiynov
, Laizhong Cui, Joshua Zhexue Huang:
Offloading dependent tasks in MEC-enabled IoT systems: A preference-based hybrid optimization method. 657-674

Chengzhe Lai, Yinzhen Wang, Hong Wang, Dong Zheng:
A blockchain-based traceability system with efficient search and query. 675-689

Zhen-Fei Wang, Yong-Wang Ren, Zhong-Ya Cao, Li-Ying Zhang:
LRBFT: Improvement of practical Byzantine fault tolerance consensus protocol for blockchains based on Lagrange interpolation. 690-708

Chunxin Lin, Ying Li
, Manzoor Ahmed, Chenliu Song:
Piece-wise pricing optimization with computation resource constraints for parked vehicle edge computing. 709-726

Zhe Tu, Huachun Zhou, Kun Li, Haoxiang Song, Wei Quan:
Blockchain-based differentiated authentication mechanism for 6G heterogeneous networks. 727-748

Zhengyang Ai, Weiting Zhang, Mingyan Li, Pengxiao Li, Lei Shi:
A smart collaborative framework for dynamic multi-task offloading in IIoT-MEC networks. 749-764

Jorgito Matiuzzi Stocchero
, Andre Dexheimer Carneiro, Iulisloi Zacarias, Edison Pignaton de Freitas:
Combining information centric and software defined networking to support command and control agility in military mobile networks. 765-784

Javid Ali Liakath, Pradeep Krishnadoss, Gobalakrishnan Natesan:
DCCWOA: A multi-heuristic fault tolerant scheduling technique for cloud computing environment. 785-802

Jian Wang, Shuai Hao, Guosheng Zhao:
CSSA-based collaborative optimization recommendation of users in mobile crowdsensing. 803-817

Simona-Vasilica Oprea
, Adela Bâra:
An Edge-Fog-Cloud computing architecture for IoT and smart metering data. 818-845

Akanksha Goel
, S. Neduncheliyan:
An intelligent blockchain strategy for decentralised healthcare framework. 846-857

Nabanita Das, Souvik Basu, Sipra Das Bit:
OlaRout: Optimal dropbox deployment based cluster routing for post disaster information exchange in a smart city. 876-899

Vidhya S
, V. Kalaivani
:
A blockchain based secure and privacy aware medical data sharing using smart contract and encryption scheme. 900-913

T. Anusha, Mullur Pushpalatha:
C3P-RPL: A collaborative and proactive approach for optimal peer to peer path selection and sustenance. 914-931

Md Asif Thanedar
, Sanjaya Kumar Panda:
A dynamic resource management algorithm for maximizing service capability in fog-empowered vehicular ad-hoc networks. 932-946

K. Sridevi, Saifulla Md. Abdul
:
LBABC: Distributed controller load balancing using artificial bee colony optimization in an SDN. 947-957

K. Kumaran
, E. Sasikala:
An efficient task offloading and resource allocation using dynamic arithmetic optimized double deep Q-network in cloud edge platform. 958-979

Chuanxin Zhao, Yancheng Yao, Na Zhang, Fulong Chen, Taochun Wang, Yang Wang:
Hybrid scheduling strategy of multiple mobile charging vehicles in wireless rechargeable sensor networks. 980-996

Jiacheng Hou, Haoye Lu, Amiya Nayak
:
A GNN-based proactive caching strategy in NDN networks. 997-1009

Naveen Chauhan
, Rajeev Agrawal
, Haider Banka:
Adaptive application offloading for QoS maximization in cloud-fog environment with delay-constraint. 1010-1026

Sarfaraj Alam Ansari
, Kunwar Pal, Prajjval Govil, Mahesh Chandra Govil:
A fuzzy based hierarchical flash crowd controller for live video streaming in P2P network. 1027-1048

Paruthi Ilam Vazhuthi Padmanaban
, Aruchamy Prasanth
, Manikandan Shanmugaperumal Periasamy
, K. K. Devi Sowndarya:
A hybrid ANFIS reptile optimization algorithm for energy-efficient inter-cluster routing in internet of things-enabled wireless sensor networks. 1049-1068

Shuo Peng, Kun Liu, Shiji Wang, Yangxia Xiang, Baoxian Zhang, Cheng Li:
Time window-based online task assignment in mobile crowdsensing: Problems and algorithms. 1069-1087

Seyed Ali Sadati, Mojtaba Shivaie, AmirAli Nazari:
Computationally efficient peer-to-peer energy trading mechanisms for autonomous agents considering network constraints and privacy preservation. 1088-1105

Saeed Banaeian Far
, Maryam Rajabzadeh Asaar, Afrooz Haghbin:
A blockchain-based coin mixing protocol with certificateless signcryption. 1106-1124

Muhammad Faisal Nadeem
, Muhammad Imran, Hafiz Muhammad Afzal Siddiqui
, Muhammad Azeem
:
Fault tolerance designs of interconnection networks. 1125-1134

Sreya Ghosh
, Iti Saha Misra, Tamal Chakraborty:
Optimal RSU deployment using complex network analysis for traffic prediction in VANET. 1135-1154

Qaisar Ayub, Sulma Rashid
:
Community trend message locking routing protocol for delay tolerant network. 1155-1173

Mohammad Naderi
, Khorshid Mahdaee, Parisa Rahmani:
Hierarchical traffic light-aware routing via fuzzy reinforcement learning in software-defined vehicular networks. 1174-1198

Rajeev Ranjan, Prabhat Kumar:
Mobility-Enabled Sustainable Data Collection in Wireless Sensor Networks. 1199-1210

Genhua Lu, Xiaofeng Jia, Yi Zhang, Jun Shao, Guiyi Wei:
A domain name management system based on account-based consortium blockchain. 1211-1226

R. Barona, E. Baburaj
:
An efficient DDoS attack detection and categorization using adolescent identity search-based weighted SVM model. 1227-1241

Lingyu Lu, Jing Yu
, Haifeng Du, Xiang Li:
A3C-based load-balancing solution for computation offloading in SDN-enabled vehicular edge computing networks. 1242-1256

Yanjun Liu, Hongwei Li, Xinyuan Qian, Meng Hao:
ESA-FedGNN: Efficient secure aggregation for federated graph neural networks. 1257-1269

Junbin Liang, Qiong Huang, Jianye Huang, Liantao Lan, Man Ho Allen Au:
An identity-based traceable ring signatures based on lattice. 1270-1285

Wenjie Zhao, Yu Wang, Wenbin Zhai
, Liang Liu, Yulei Liu:
Efficient time-delay attack detection based on node pruning and model fusion in IoT networks. 1286-1309

P. Arulprakash, A. Suresh Kumar, S. Poorna Prakash:
Optimal route and cluster head selection using energy efficient-modified African vulture and modified mayfly in manet. 1310-1326
Volume 16, Number 3, May 2023

Yu Wang, Wenyong Wang, Youlu Zeng, Ting Yang
:
GradingShard: A new sharding protocol to improve blockchain throughput. 1327-1339

Anmulin Wu
, Yajun Guo, Yimin Guo:
A decentralized lightweight blockchain-based authentication mechanism for Internet of Vehicles. 1340-1353

Yuxia Fu, Jun Shao, Qingjia Huang, Qihang Zhou
, Huamin Feng, Xiaoqi Jia, Ruiyi Wang, Wenzhi Feng:
Non-transferable blockchain-based identity authentication. 1354-1364

Egide Nkurunziza
, Fagen Li:
HAP-SG: Heterogeneous authentication protocol for smart grid. 1365-1379

Princy Victor, Arash Habibi Lashkari
, Rongxing Lu, Tinshu Sasi, Pulei Xiong, Shahrear Iqbal
:
IoT malware: An attribute-based taxonomy, detection mechanisms and challenges. 1380-1431

Kai Fan, Zeyu Shi, Yicen Yang, Liyang Bai, Yintang Yang, Kan Yang, Hui Li:
Blockchain-based cloud-edge clock calibration in IoT. 1432-1444

Pooja Choksy, Akhil Chaurasia, Udai Pratap Rao, Sonu Kumar:
Attribute based access control (ABAC) scheme with a fully flexible delegation mechanism for IoT healthcare. 1445-1467

Zhibin Liu, Yuhan Liu, Yuxia Lei, Zhenyou Zhou, Xinshui Wang:
ARLO: An asynchronous update reinforcement learning-based offloading algorithm for mobile edge computing. 1468-1480

Jigyasa Chadha, Aarti Jain
, Yogesh Kumar
:
Satellite imagery-based Airbus ship localization and detection using deep learning-based approaches. 1481-1498

Seyed Salar Sefati, Mehrdad Abdi, Ali Ghaffari
:
QoS-based routing protocol and load balancing in wireless sensor networks using the markov model and the artificial bee colony algorithm. 1499-1512

Prarthana J. Mehta, Balu L. Parne, Sankita J. Patel:
SE-LAKAF: Security enhanced lightweight authentication and key agreement framework for smart grid network. 1513-1535

Guosheng Zhao, Xiao Wang, Jian Wang, Jia Liu:
Task recommendation for mobile crowd sensing system based on multi-view user dynamic behavior prediction. 1536-1550

Shengzhou Hu, Wenhao Li, Tingting Zhong, Hua He:
An innovative key agreement protocol with complex attribute authentication based on blockchain. 1551-1569

Changzhen Zhang
, Zhanyou Ma, Lin Liu, Yilin Liu:
Correction to: Modeling & analysis of block generation process of the mining pool in blockchain system. 1570

S. Kranthi
, M. Kanchana
, M. Suneetha
:
Correction: An intelligent intrusion prediction and prevention system for software defined internet of things cloud networks. 1571
Volume 16, Number 4, August 2023

Du Chen, Deyun Gao, Lu Jin, Wei Quan, Hongke Zhang:
ADAS: Adaptive Delay-Aligned Scheduling for Multipath Transmission in Heterogeneous Wireless Networks. 1583-1595

Xuewen He, Kaihua Cao:
LoRa network communication protocol based on location and time planning. 1596-1608

Vijay Rayar, Udaykumar Naik, Prabhakar S. Manage:
A RSS-based path loss model approaches multi-dimensional scaling to localize 2D sensor nodes in WSN. 1609-1623

Nour El Houda Bourebia
, Chunlin Li:
A novel raccoon optimization algorithm with multi-objective clustering strategy based routing protocol for WSNs. 1624-1640

Peiyan Yuan, Zhao Han, Xiaoyan Zhao:
Integrating the edge intelligence technology into image composition: A case study. 1641-1651

Tao Li, Yali Liu, Jianting Ning:
SDRLAP: A secure lightweight RFID mutual authentication protocol based on PUF with strong desynchronization resistance. 1652-1667

Zijia Wang, Baoxian Zhang, Yangxia Xiang, Cheng Li
:
Joint task assignment and path planning for truck and drones in mobile crowdsensing. 1668-1679

Jie Yin, Chuntang Zhang, Wenwei Xie, Guangjun Liang, Lanping Zhang, Guan Gui:
Anomaly traffic detection based on feature fluctuation for secure industrial internet of things. 1680-1695

Junlu Wang, Su Li, Wanting Ji, Dong Li, Baoyan Song:
A composite blockchain associated event traceability method for financial activities. 1696-1715

Shengchen Duan, Hong Liu, Lize Gu:
A searchable encryption scheme with hidden search pattern and access pattern on distributed cloud system. 1716-1738

Suguna Paramasivam, R. Leela Velusamy:
Quality of service aware routing in software defined video streaming: a survey. 1739-1760

Anu Monisha A
, T. R. Reshmi, Krishnan Murugan:
ERNSS-MCC: Efficient relay node selection scheme for mission critical communication using machine learning in VANET. 1761-1784

Morteza Adeli, Nasour Bagheri, Sadegh Sadeghi, Saru Kumari:
χperbp: a cloud-based lightweight mutual authentication protocol. 1785-1802

Feng Zeng, Ranran Rou, Qi Deng, Jinsong Wu
:
Parked vehicles crowdsourcing for task offloading in vehicular edge computing. 1803-1818

R. Sarath Kumar
, P. Sampath, M. Ramkumar
:
Enhanced Elman Spike Neural Network fostered intrusion detection framework for securing wireless sensor network. 1819-1833

Xiaoyan Hu, Weicheng Zhou, Jun Yin, Guang Cheng, Shen Yan, Hua Wu:
Towards verifiable and privacy-preserving account model on a consortium blockchain based on zk-SNARKs. 1834-1851

Deepak Choudhary, Roop Pahuja
:
A blockchain-based cyber-security for connected networks. 1852-1867

Bidisha Bhabani, Judhistir Mahapatro:
TRP: A TOPSIS-based RSU-enabled priority scheduling scheme to disseminate alert messages of WBAN sensors in hybrid VANETs. 1868-1886

Guosheng Zhao, Cai Ren, Jian Wang, Yuyan Huang, Huan Chen:
IoT intrusion detection model based on gated recurrent unit and residual network. 1887-1899

Elham Ebrahimpour, Shahram Babaie:
A Lightweight authentication approach based on linear feedback shift register and majority function for internet of things. 1900-1915

Faezeh Alizadeh, Amir Jalaly Bidgoly:
Bit flipping attack detection in low power wide area networks using a deep learning approach. 1916-1926

Bei Yu, Libo Feng
, Hongyu Zhu, Fei Qiu, Ji Wan, Shaowen Yao:
MeHLDT: A multielement hash lock data transfer mechanism for on-chain and off-chain. 1927-1943

Jia Liu, Jian Wang, Yuping Yan, Guosheng Zhao:
A task allocation method based on data fusion of multimodal trajectory in mobile crowd sensing. 1944-1958

Duraimurugan Samiayya, S. Radhika, A. Chandrasekar:
An optimal model for enhancing network lifetime and cluster head selection using hybrid snake whale optimization. 1959-1974

Ravi Raushan Kumar Chaudhary, Kakali Chatterjee:
A Lightweight PUF based Multi-factor Authentication Technique for Intelligent Smart Healthcare System. 1975-1992

Sivanandam Sivamohan, S. S. Sridhar, Sivamohan Krishnaveni
:
TEA-EKHO-IDS: An intrusion detection system for industrial CPS with trustworthy explainable AI and enhanced krill herd optimization. 1993-2021
Volume 16, Number 5, September 2023

Mian Guo, Chengyuan Xu, Mithun Mukherjee
:
RIS-assisted device-edge collaborative edge computing for industrial applications. 2023-2038

Junyan Chen, Xuefeng Huang, Yong Wang, Hongmei Zhang, Cenhuishan Liao, Xiaolan Xie, Xinmei Li, Wei Xiao:
ASTPPO: A proximal policy optimization algorithm based on the attention mechanism and spatio-temporal correlation for routing optimization in software-defined networking. 2039-2057

Yu Gao, Jun Tao, Haotian Wang, Zuyan Wang, Dika Zou, Yifan Xu:
Benefit-oriented task offloading in UAV-aided mobile edge computing: An approximate solution. 2058-2072

Bin Zhao, Jiqun Zhang
, Cao Wei, Li Bin, Wenyin Zhang, Yilong Gao:
A dynamic evaluation model of data price based on game theory. 2073-2088

S. Nagadivya, R. Manoharan:
Energy efficient fuzzy logic prediction-based opportunistic routing protocol (EEFLPOR) for wireless sensor networks. 2089-2102

Peiyue Jiang, Chengye Zheng, Qinchun Ke, Xiaobo Gu:
Robust cooperative localization using peer-to-peer ranging measurements. 2103-2112

Antony Prince John, Jagadhiswaran Devaraj, Lathaselvi Gandhimaruthian, Javid Ali Liakath
:
Swarm learning based credit scoring for P2P lending in block chain. 2113-2130

B. Naresh Kumar, Jai Sukh Paul Singh:
Development of multi-objective cognitive radio network with energy harvesting for medical data transmission. 2131-2152

Jay Nagarajan, Pegah Mansourian, Muhammad Anwar Shahid
, Arunita Jaekel, Ikjot Saini
, Ning Zhang, Marc Kneppers:
Machine Learning based intrusion detection systems for connected autonomous vehicles: A survey. 2153-2185

Soni Chaurasia
, Kamal Kumar:
ACRA: Adaptive meta-heuristic based Clustering and Routing Algorithm for IoT-assisted wireless sensor network. 2186-2201

Yanyan Duan, Fenghua Huang, Lingwei Xu, T. Aaron Gulliver:
Intelligent spectrum sensing algorithm for cognitive internet of vehicles based on KPCA and improved CNN. 2202-2217

Xiaopeng Yu, Jie Feng, Wei Zhao, Haomiao Yang, Dianhua Tang:
Peer-to-peer privacy-preserving vertical federated learning without trusted third-party coordinator. 2242-2255

Irshad Ullah, Xiaoheng Deng, Xinjun Pei
, Ping Jiang, Husnain Mushtaq
:
A verifiable and privacy-preserving blockchain-based federated learning approach. 2256-2270

Yan Wang, Yuxin Gong, Huikang Yang:
A mobile localization algorithm based on fuzzy estimation for serious NLOS scenes. 2271-2289

Gopal Singh Rawat, Karan Singh:
A bayesian-based distributed trust management scheme for connected vehicles' security. 2290-2306

S. Nikkath Bushra
, Nalini Subramanian, A. Chandrasekar:
An optimal and secure environment for intrusion detection using hybrid optimization based ResNet 101-C model. 2307-2324

Sanaa Kaddoura
, Ramzi A. Haraty, Sultan Aljahdali, Maram Assi:
SDODV: A smart and adaptive on-demand distance vector routing protocol for MANETs. 2325-2348

Xiaohong Zhang, Jiaming Lai, Ata Jahangir Moshayedi:
Traffic data security sharing scheme based on blockchain and traceable ring signature for VANETs. 2349-2366

K. Swapna Sudha, N. Jeyanthi
:
Merkle hash tree improved strongly constrained discrete hashing function-based authentication scheme for enabling security for smart home IoT applications. 2367-2379

P. Deepavathi, C. Mala:
IMDRPL: Identifying and eliminating malicious devices using DIO and DAO ICMP control messages in RPL-based protocol. 2380-2398

Xueyan Liu, Linpeng Li, Ruirui Sun, Wenjing Li, Tao Liu:
Lightweight multi-departmental data sharing scheme based on consortium blockchain. 2399-2414

Jhong-Ting Lou, Showkat Ahmad Bhat, Nen-Fu Huang:
Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system. 2415-2437

Khuong Ho-Van:
Jammer selection for energy harvesting-aided non-orthogonal multiple access: Performance analysis. 2438-2455

P. Sheela Rani
, S. Baghavathi Priya:
A block chain-based approach using proof of continuous work consensus algorithm to secure the educational records. 2456-2473

Shuangrong Peng, Xiaohu Tang, Ling Xiong, Hui Zhu:
LGAAFS: A lightweight group anonymous mutual authentication and forward security scheme for wireless body area networks. 2474-2491

Weiyou Liang, Yujue Wang, Yong Ding
, Haibin Zheng, Hai Liang, Huiyong Wang:
An efficient blockchain-based anonymous authentication and supervision system. 2492-2511

S. Ambareesh
, H. C. Kantharaju, M. Sakthivel
:
A novel Fuzzy TOPSIS based hybrid jarratt butterfly optimization for optimal routing and cluster head selection in WSN. 2512-2524

Raghav
, Nitish Andola, S. Venkatesan, Shekhar Verma:
Privacy-preserving cloud data sharing for healthcare systems with hybrid blockchain. 2525-2547

Bshisht Moony, Amit K. Barnwal
, Mrityunjay Singh, Dheerendra Mishra
:
Quantum secure two party authentication protocol for mobile devices. 2548-2559

Gobalakrishnan Natesan, Manikandan Nanjappan, Pradeep Krishnadoss, L. Sherly Puspha Annabel:
Task scheduling based on minimization of makespan and energy consumption using binary GWO algorithm in cloud environment. 2560-2573

Ruizhong Du
, Chenghao Yu, Mingyue Li:
Enabling efficient and verifiable secure search on cloud-based encrypted big data. 2574-2590

Yangyang Jiang, Yepeng Guan:
A cluster reputation-based hierarchical consensus model in blockchain. 2591-2606

S. Madhavi
, Ramalingam Praveen
, N. Jagadish Kumar
, S. M. Udhaya Sankar
:
Hybrid Grey PIPRECIA and Grey OCRA method-based dynamic multi-criteria decision-making model for mitigating non-cooperating node attacks in WSNs. 2607-2629

Xinyu Yi, Yuping Zhou, Yuqian Lin, Ben Xie, Junjie Chen, Chenye Wang:
Digital rights management scheme based on redactable blockchain and perceptual hash. 2630-2648

Xiaohua Wu
, Fangjian Yu, Jing Wang, Jinpeng Chang, Xueqi Feng:
Bpf-payment: Fair payment for cloud computing with privacy based on blockchain and homomorphic encryption. 2649-2666
Volume 16, Number 6, November 2023

Jian Chen, Kaili Zhai, Jie Jia, An Du, Yi Xue, Xingwei Wang:
Online resource allocation for QoE optimization in CoMP-assisted eMBMS system. 2667-2680

Bing Tang, Shaifeng Zheng, Qing Yang:
Joint optimization of energy and delay for computation offloading in vehicular edge computing. 2681-2695

V. Krishnakumar
, R. Asokan:
Block chain based trusted distributed routing scheme using optimized dropout ensemble extreme learning neural network in MANET. 2696-2713

Sai Srinivas Vellela
, R. Balamanigandan:
An intelligent sleep-awake energy management system for wireless sensor network. 2714-2731

Haohua Zhu, Rongxin Guo, Wenxian Jiang, Bolun Pan:
Blockchain-based technology for commerce data management using reputation algorithm with QoS mechanism. 2732-2746

R. Prabha
, G. A. Senthil
, SU. Suganthi
:
Cluster head based secure routing using optimized dual-discriminator conditional generative adversarial network in wireless ad-hoc networks. 2747-2760

Jingting Xue, Lingjie Shi, Liang Liu, Xiaojun Zhang, Fagen Li:
Anonymity-enhancing decentralized protocol for coin mixing based on ring signatures and key derivation. 2761-2774

Guosheng Zhao, Huan Chen, Jian Wang:
A lightweight block encryption algorithm for narrowband internet of things. 2775-2793

Meena Rao
, Parul Chaudhary
, Kavita Sheoran, Geetika Dhand:
A secure routing protocol using hybrid deep regression based trust evaluation and clustering for mobile ad-hoc network. 2794-2810

Shakira Musa Baig, Muhammad Umar Javed
, Ahmad Almogren, Nadeem Javaid, Mohsin Jamil
:
A blockchain and stacked machine learning approach for malicious nodes' detection in internet of things. 2811-2832

Ruchi Garg, Tarun Gulati
, Sumit Kumar:
Wormhole attack detection and recovery for secure range free localization in large-scale wireless sensor networks. 2833-2849

Rui Han, Yu Wang, Mingfa Wan, Teng Yuan, Guozi Sun:
FIBPRO: Peer-to-peer data management and sharing cloud storage system based on blockchain. 2850-2864

Xianzhong Tian, Pengcheng Xu, Yifan Shen, Yuheng Shao:
Joint DNN partitioning and resource allocation for completion rate maximization of delay-aware DNN inference tasks in wireless powered mobile edge computing. 2865-2878

Jianshan Zhang, Ming Li, Bing Lin
, Katinka Wolter:
Joint optimization of IoT devices access and bandwidth resource allocation for network slicing in edge-enabled radio access networks. 2879-2891

Yihan Kong, Jing Li, Ting Xiong, Tao Xie
:
EVONChain: a bi-tiered public blockchain network architecture. 2892-2914

Zhen-Fei Wang, Shi-Qi Liu, Pu Wang, Li-Ying Zhang:
BW-PBFT: Practical byzantine fault tolerance consensus algorithm based on credit bidirectionally waning. 2915-2928

Behnam Mohammad Hasani Zade, Mohammad Masoud Javidi, Najme Mansouri:
An improved Caledonian crow learning algorithm based on ring topology for security-aware workflow scheduling in cloud computing. 2929-2984

Tania Saleem, Muhammad Ismaeel, Muhammad Umar Janjua, Abdulrahman Ali, Awab Aqib, Ali Ahmed, Saeed-Ul Hassan:
Predicting functional roles of Ethereum blockchain addresses. 2985-3002

Murat Karakus, Evrim Guler, Suleyman Uludag
:
Smartcontractchain (SC2): Cross-ISP QoS traffic management framework with SDN and blockchain. 3003-3020

Monica Bhutani
, Brejesh Lall, Monika Agrawal:
A novel energy-efficient adaptive superframe structure for OWC-based real-time bio-sensor networks. 3021-3031

Fei Yan, Hongbin Luo, Shan Zhang, Zhiyuan Wang, Peng Lian:
A comparative study of IP-based and ICN-based link-state routing protocols in LEO satellite networks. 3032-3046

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







