default search action
Peer-to-Peer Networking and Applications, Volume 10
Volume 10, Number 1, January 2017
- Shehzad Ashraf Chaudhry, Husnain Naqvi, Muhammad Sher, Mohammad Sabzinejad Farash, Mahmood Ul Hassan:
An improved and provably secure privacy preserving authentication protocol for SIP. 1-15 - Fan Wu, Lili Xu, Saru Kumari, Xiong Li:
A new and secure authentication scheme for wireless sensor networks with formal proof. 16-30 - Thong Huynh, Olivica Priyono, Suk-Hwan Lee, Won-Joo Hwang:
Simultaneous mobility of data sources and content requesters in content-centric networking. 31-44 - Muhammad Salman Raheel, Raad Raad, Christian H. Ritz:
Achieving maximum utilization of peer's upload capacity in p2p networks using SVC. 45-65 - Tarachand Amgoth, Prasanta K. Jana:
Coverage hole detection and restoration algorithm for wireless sensor networks. 66-78 - Omid Mir, Jorge Munilla, Saru Kumari:
Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks. 79-91 - Saru Kumari, Shehzad Ashraf Chaudhry, Fan Wu, Xiong Li, Mohammad Sabzinejad Farash, Muhammad Khurram Khan:
An improved smart card based authentication scheme for session initiation protocol. 92-105 - Haiyong Bao, Rongxing Lu:
A lightweight data aggregation scheme achieving privacy preservation and data integrity with differential privacy and fault tolerance. 106-121 - Alberto Aguilar, Juan Arturo Nolazco-Flores, César Vargas Rosales, Raime Bustos:
Characterisation, design and simulation of an efficient peer-to-peer content distribution system for enterprise networks. 122-137 - Mohammad Al Mojamed, Mario Kolberg:
Design and evaluation of a peer-to-peer MANET crosslayer approach: OneHopOverlay4MANET. 138-155 - Sajal K. Das, Zohar Naor, Mayank Raj:
Popularity-based caching for IPTV services over P2P networks. 156-169 - José Vicente Aguirre, Rafael Álvarez, Antonio Zamora:
Darkcube: A k-Hypercube based P2P VoIP protocol. 170-183 - Zhixin Liu, Yazhou Yuan, Longli Fu, Xinping Guan:
Outage performance improvement with cooperative relaying in cognitive radio networks. 184-192 - Kubilay Demir, Daniel Germanus, Neeraj Suri:
Robust QoS-aware communication in the smart distribution grid. 193-207 - Sina Keshvadi, Amir Masoud Rahmani, Habib Rostami:
Recommend top-k most downloaded files in the chord-based P2P file-sharing system. 208-215 - Adnan Ahmed, Kamalrulnizam Abu Bakar, Muhammad Ibrahim Channa, Abdul Waheed Khan, Khalid Haseeb:
Energy-aware and secure routing with trust for disaster response wireless sensor network. 216-237 - Yong Zhou, Weihua Zhuang:
Opportunistic cooperation in wireless ad hoc networks with interference correlation. 238-252 - Gang Yu, Zhenfu Cao:
Attribute-based signcryption with hybrid access policy. 253-261 - Hao Hu, Rongxing Lu, Zonghua Zhang:
TPSQ: Trust-based platoon service query via vehicular communications. 262-277 - Gulustan Dogan, Koksal Avincan:
MultiProTru: A kalman filtering based trust architecture for two-hop wireless sensor networks. 278-291
Volume 10, Number 2, March 2017
- Haojin Zhu, Kuai Xu, Xiang Lu:
Guest editorial: Special issue on algorithms, systems and applications in mobile social networks. 293-295 - Zejun Xu, Zhou Su, Qichao Xu, Qifan Qi, Tingting Yang, Jintian Li, Dongfeng Fang, Bo Han:
Delivering mobile social content with selective agent and relay nodes in content centric networks. 296-304 - Xia Feng, Chun-yan Li, De-xin Chen, Jin Tang:
A method for defensing against multi-source Sybil attacks in VANET. 305-314 - Xintao Hong, Hongbin Liang, Zengan Gao, Hongwei Li:
An adaptive resource allocation model in anti-money laundering system. 315-331 - Rong Ma, Zhenfu Cao:
Serial number based encryption and its application for mobile social networks. 332-339 - Wenbin Yu, Zhe Liu, Cailian Chen, Bo Yang, Xinping Guan:
Privacy-preserving design for emergency response scheduling system in medical social networks. 340-356 - Minhui Xue, Limin Yang, Keith W. Ross, Haifeng Qian:
Characterizing user behaviors in location-based find-and-flirt services: Anonymity and demographics - A WeChat Case Study. 357-367 - Kai Fan, Nan Ge, Yuanyuan Gong, Hui Li, Ruidan Su, Yintang Yang:
An ultra-lightweight RFID authentication scheme for mobile commerce. 368-376 - Xiaoming Wang, Yaguang Lin, Yanxin Zhao, Lichen Zhang, Juhua Liang, Zhipeng Cai:
A novel approach for inhibiting misinformation propagation in human mobile opportunistic networks. 377-394 - Zehao Sun, Shaojie Tang, He Huang, Zhenyu Zhu, Hansong Guo, Yu-e Sun, Liusheng Huang:
SOS: Real-time and accurate physical assault detection using smartphone. 395-410 - Xiaoheng Deng, Genghao Li, Mianxiong Dong, Kaoru Ota:
Finding overlapping communities based on Markov chain and link clustering. 411-420
Volume 10, Number 3, May 2017
- Yongmin Zhang, Wenchao Meng, Heng Zhang, Preetha Thulasiraman, Tom H. Luan:
Guest editorial: Distributed control and optimization of wireless networks. 421-424 - Ruilong Deng, Hao Liang, Jing Yong, Bo Chai, Tingting Yang:
Distributed rate control, routing, and energy management in dynamic rechargeable sensor networks. 425-439 - Yanjun Li, Lingkun Fu, You Ying, Yong Sun, Kaikai Chi, Yi-hua Zhu:
Goodput optimization via dynamic frame length and charging time adaptation for backscatter communication. 440-452 - Praveen Lalwani, Haider Banka, Chiranjeev Kumar:
CRWO: Clustering and routing in wireless sensor networks using optics inspired optimization. 453-471 - Guangqian Xie, Kaoru Ota, Mianxiong Dong, Feng Pan, Anfeng Liu:
Energy-efficient routing for mobile data collectors in wireless sensor networks with obstacles. 472-483 - Chuan Zhu, Guangjie Han, Hui Zhang:
A honeycomb structure based data gathering scheme with a mobile sink for wireless sensor networks. 484-499 - Huan Zhou, Linping Tong, Tingyao Jiang, Shouzhi Xu, Jialu Fan, Ke Lv:
Maximum data delivery probability-oriented routing protocol in opportunistic mobile networks. 500-509 - Fu Xiao, Zhifei Jiang, Xiaohui Xie, Lijuan Sun, Ruchuan Wang:
An energy-efficient data transmission protocol for mobile crowd sensing. 510-518 - Tri Gia Nguyen, Chakchai So-In, Gia Nhu Nguyen, Songyut Phoemphon:
A novel energy-efficient clustering protocol with area coverage awareness for wireless sensor networks. 519-536 - Wei Wang, Haoshan Shi, Dajun Wu, Pengyu Huang, Baojian Gao, Fuping Wu, Dan Xu, Xiaojiang Chen:
VD-PSO: An efficient mobile sink routing algorithm in wireless sensor networks. 537-546 - Yi-Nan Guo, Jian Cheng, Haiyuan Liu, Dunwei Gong, Yu Xue:
A novel knowledge-guided evolutionary scheduling strategy for energy-efficient connected coverage optimization in WSNs. 547-558 - Zhuangbin Chen, Anfeng Liu, Zhetao Li, Young-June Choi, Jie Li:
Distributed duty cycle control for delay improvement in wireless sensor networks. 559-578 - Wenjun Zhang, Bin Lin, Qingshan Yin, Tiange Zhao:
Infrastructure deployment and optimization of fog network based on MicroDC and LRPON integration. 579-591 - Aanchal, Sushil Kumar, Omprakash Kaiwartya, Abdul Hanan Abdullah:
Green computing for wireless sensor networks: Optimization and Huffman coding approach. 592-609 - Zhijie Ma, Qinglin Zhao, Jun Huang:
Optimizing bandwidth allocation for heterogeneous traffic in IoT. 610-621 - Yuan Ren, Hui Gao, Tiejun Lv:
Robust beamforming and artificial noise design in interference networks with wireless information and power transfer. 622-632 - Varun Kumar Sharma, Mahesh Kumar:
Adaptive congestion control scheme in mobile ad-hoc networks. 633-657 - Zhen Hong, Rui Wang, Xile Li, Ning Wang:
A tree-based topology construction algorithm with probability distribution and competition in the same layer for wireless sensor network. 658-669 - Santosh Kumar Das, Ajay Kumar Yadav, Sachin Tripathi:
IE2M: Design of intellectual energy efficient multicast routing protocol for ad-hoc network. 670-687 - Andong Liu, Rongchao Zhang, Wen-An Zhang, You Teng:
Nash-optimization distributed model predictive control for multi mobile robots formation. 688-696 - Zhi Li, Jianhui Zhang, Xingfa Shen, Jin Fan:
Prediction based indoor fire escaping routing with wireless sensor network. 697-707 - Zhu Ren, WeiQiang Xu, Yanyun Dai, Lurong Jiang:
Multi-event Detection with Rechargeable Sensors. 708-716 - Pu Yang, Xu Pan, Jianwei Liu, Ruicheng Guo:
Optimal fault-tolerant control for UAV systems with time delay and uncertainties over wireless network. 717-725 - Dhafer Ben Arbia, Muhammad Mahtab Alam, Rabah Attia, Elyes Ben Hamida:
ORACE-Net: A novel multi-hop body-to-body routing protocol for public safety networks. 726-749 - Jiachao Chen, Yuan Wu, Li Ping Qian, Hong Peng, Haibo Zhou:
Energy-efficient content distribution via mobile users cooperations in cellular networks. 750-764 - Guangsheng Feng, Yue Li, Qian Zhao, Huiqiang Wang, Hongwu Lv, Junyu Lin:
Optimizing broadcast duration for layered video streams in cellular networks. 765-779 - Tianzhang Xing, Binbin Xie, Tong Xian, Yizhi Heng, Meng Jin, Xia Zheng, Dingyi Fang:
Treasures status monitoring based on dynamic link-sensing. 780-794 - Yourong Chen, Siyi Lu, Junjie Chen, Tiaojuan Ren:
Node localization algorithm of wireless sensor networks with mobile beacon node. 795-807 - Xiufang Shi, Yong Huat Chew, Chau Yuen, Zaiyue Yang:
A novel mobile target localization algorithm via HMM-based channel sight condition identification. 808-822 - Haikuo Shen, Kaihua Zhang, Afsoon Nejati:
A noncontact positioning measuring system based on distributed wireless networks. 823-832
Volume 10, Number 4, July 2017
- M. Milton Joe, B. Ramakrishnan:
Novel authentication procedures for preventing unauthorized access in social networks. 833-843 - Shengke Zeng, Yong Chen, Shuangquan Tan, Mingxing He:
Concurrently deniable ring authentication and its application to LBS in VANETs. 844-856 - Priyanka Jaiswal, Sachin Tripathi:
An authenticated group key transfer protocol using elliptic curve cryptography. 857-864 - Jian Wang, Zhipeng Wu, Yanheng Liu, Weiwen Deng, Heekuck Oh:
Computational data privacy in wireless networks. 865-873 - Pouya Bisadi, Zahra Mirikharaji, Bradford G. Nickerson:
A fault tolerant peer-to-peer spatial data structure. 874-886 - Yao-Ren Lee, Wen-Long William Chin:
Low-complexity time synchronization for energy-constrained wireless sensor networks: Dual-Clock delayed-message approach. 887-896 - Ajay Kumar Yadav, Sachin Tripathi:
QMRPRNS: Design of QoS multicast routing protocol using reliable node selection scheme for MANETs. 897-909 - Mohammad A. Khan, Laurent Yeh, Karine Zeitouni, Cristian Borcea:
MobiStore: A system for efficient mobile P2P data sharing. 910-924 - Kshitiz Verma, Gianluca Rizzo, Antonio Fernández Anta, Rubén Cuevas Rumín, Arturo Azcorra, Shmuel Zaks, Alberto García-Martínez:
Energy-optimal collaborative file distribution in wired networks. 925-944 - Lingwei Xu, Hao Zhang, T. Aaron Gulliver:
Joint TAS and power allocation for D2D cooperative networks. 945-953 - Artur Olszak:
HyCube: A distributed hash table based on a variable metric. 954-982 - Yu Zhang, Jiangtao Wen:
The IoT electric business model: Using blockchain technology for the internet of things. 983-994 - Yinbin Miao, Jianfeng Ma, Fushan Wei, Zhiquan Liu, Xu An Wang, Cunbo Lu:
VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel. 995-1007 - Abdelwahab Boualouache, Samira Moussaoui:
TAPCS: Traffic-aware pseudonym changing strategy for VANETs. 1008-1020 - Hossein Mohammadi Nejad, Naser Movahhedinia, Mohammad Reza Khayyambashi:
Improving the reliability of wireless data communication in Smart Grid NAN. 1021-1033 - Preetha Thulasiraman, Grace A. Clark, Timothy M. Beach:
Applying location estimation for reliable routing in tactical unmanned ground vehicle networks. 1034-1050 - Narges Mohammadi Sarband, Mohammad Reza Khayyambashi, Naser Movahedi Nia:
Quality enhancement of video on demand implementation in peer-to-peer networks by optimum chunk length in the BitTorrent. 1051-1062 - Yang Wang, Shuang Wu, Xiaofeng Gao, Fan Wu, Guihai Chen:
Minimizing mobile sensor movements to form a line K-coverage. 1063-1078 - Yung-Ting Chuang:
Protecting against malicious and selective forwarding attacks for P2P search & retrieval system. 1079-1100 - Sandeep A. Thorat, Prakash Jayanth Kulkarni:
Uncertainty analysis framework for trust based routing in MANET. 1101-1111
Volume 10, Number 5, September 2017
- Ajmery Sultana, Xavier N. Fernando, Lian Zhao:
An overview of medium access control strategies for opportunistic spectrum access in cognitive radio networks. 1113-1141 - Xingyan Zhang:
Adaptive flow scheduling for modular datacenter networks. 1142-1151 - Praveenkumar Khethavath, Johnson P. Thomas, Eric Chan-Tin:
Towards an efficient distributed cloud computing architecture. 1152-1168 - Kun Lu, Shiyu Wang, Ling Xie, Zhen Wang, Mingchu Li:
Modeling altruism agents: Incentive mechanism in autonomous networks with other-regarding preference. 1169-1181 - Max Bhatia, Mritunjay Kumar Rai:
Identifying P2P traffic: A survey. 1182-1203 - Hao Hu, Rongxing Lu, Cheng Huang, Zonghua Zhang:
PTRS: A privacy-preserving trust-based relay selection scheme in VANETs. 1204-1218 - Chuan Lin, Yuanguo Bi, Hai Zhao, Wei Cai:
Research on bottleneck-delay in internet based on IP united mapping. 1219-1231 - Ming Zhao, Arun Kumar, Peter Han Joo Chong, Rongxing Lu:
A comprehensive study of RPL and P2P-RPL routing protocols: Implementation, challenges and opportunities. 1232-1256 - Xianfu Meng, Hongxi Meng, Tianjiao Li:
Research on the implicit feedback mechanism in peer-to-peer trust models. 1257-1269
Volume 10, Number 6, November 2017
- Editor's note: Special Issue on Mobile Ad-hoc and Sensor Networks. 1271
- Zhongnan Zhang, Lei Hu, Ming Qiu, Fangyuan Gao:
Events detection and community partition based on probabilistic snapshot for evolutionary social network. 1272-1284 - Haibin Zhang, Jiajia Liu, Rong Li, Hua Le:
Fault diagnosis of body sensor networks using hidden Markov model. 1285-1298 - Yingfan L. Du, Lidong Wu:
Connected sensor cover and related problems. 1299-1303 - Zhenhua Duan, Cong Tian, Mengchu Zhou, Xiaobing Wang, Nan Zhang, Hongwei Du, Lei Wang:
Two-layer hybrid peer-to-peer networks. 1304-1322 - Xu-Rui Gao, Li Wang, Wei-Li Wu:
Using multi-features to recommend friends on location-based social networks. 1323-1330 - Na Ruan, Mengyuan Li, Jie Li:
A novel broadcast authentication protocol for internet of vehicles. 1331-1343 - Qichao Xu, Zhou Su, Zejun Xu, Dongfeng Fang, Bo Han:
Analysis to reveal evolution and topological features of a real mobile social network. 1344-1353 - Qinghe Du, Meng Liu, Qian Xu, Houbing Song, Li Sun, Pinyi Ren:
Interference-constrained routing over P2P-share enabled multi-hop D2D networks. 1354-1370
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.