


default search action
Peer-to-Peer Networking and Applications, Volume 10
Volume 10, Number 1, January 2017
- Shehzad Ashraf Chaudhry

, Husnain Naqvi, Muhammad Sher
, Mohammad Sabzinejad Farash
, Mahmood Ul Hassan
:
An improved and provably secure privacy preserving authentication protocol for SIP. 1-15 - Fan Wu

, Lili Xu, Saru Kumari
, Xiong Li
:
A new and secure authentication scheme for wireless sensor networks with formal proof. 16-30 - Thong Huynh, Olivica Priyono, Suk-Hwan Lee, Won-Joo Hwang:

Simultaneous mobility of data sources and content requesters in content-centric networking. 31-44 - Muhammad Salman Raheel, Raad Raad, Christian H. Ritz

:
Achieving maximum utilization of peer's upload capacity in p2p networks using SVC. 45-65 - Tarachand Amgoth

, Prasanta K. Jana:
Coverage hole detection and restoration algorithm for wireless sensor networks. 66-78 - Omid Mir

, Jorge Munilla, Saru Kumari
:
Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks. 79-91 - Saru Kumari

, Shehzad Ashraf Chaudhry
, Fan Wu
, Xiong Li
, Mohammad Sabzinejad Farash
, Muhammad Khurram Khan
:
An improved smart card based authentication scheme for session initiation protocol. 92-105 - Haiyong Bao, Rongxing Lu:

A lightweight data aggregation scheme achieving privacy preservation and data integrity with differential privacy and fault tolerance. 106-121 - Alberto Aguilar, Juan Arturo Nolazco-Flores

, Cesar Vargas-Rosales
, Raime Bustos:
Characterisation, design and simulation of an efficient peer-to-peer content distribution system for enterprise networks. 122-137 - Mohammad Al Mojamed

, Mario Kolberg:
Design and evaluation of a peer-to-peer MANET crosslayer approach: OneHopOverlay4MANET. 138-155 - Sajal K. Das

, Zohar Naor, Mayank Raj
:
Popularity-based caching for IPTV services over P2P networks. 156-169 - José Vicente Aguirre, Rafael Álvarez, Antonio Zamora

:
Darkcube: A k-Hypercube based P2P VoIP protocol. 170-183 - Zhixin Liu, Yazhou Yuan, Longli Fu, Xinping Guan:

Outage performance improvement with cooperative relaying in cognitive radio networks. 184-192 - Kubilay Demir

, Daniel Germanus, Neeraj Suri
:
Robust QoS-aware communication in the smart distribution grid. 193-207 - Sina Keshvadi

, Amir Masoud Rahmani
, Habib Rostami
:
Recommend top-k most downloaded files in the chord-based P2P file-sharing system. 208-215 - Adnan Ahmed

, Kamalrulnizam Abu Bakar
, Muhammad Ibrahim Channa, Abdul Waheed Khan
, Khalid Haseeb
:
Energy-aware and secure routing with trust for disaster response wireless sensor network. 216-237 - Yong Zhou, Weihua Zhuang

:
Opportunistic cooperation in wireless ad hoc networks with interference correlation. 238-252 - Gang Yu, Zhenfu Cao

:
Attribute-based signcryption with hybrid access policy. 253-261 - Hao Hu

, Rongxing Lu, Zonghua Zhang:
TPSQ: Trust-based platoon service query via vehicular communications. 262-277 - Gulustan Dogan, Koksal Avincan

:
MultiProTru: A kalman filtering based trust architecture for two-hop wireless sensor networks. 278-291
Volume 10, Number 2, March 2017
- Haojin Zhu

, Kuai Xu
, Xiang Lu:
Guest editorial: Special issue on algorithms, systems and applications in mobile social networks. 293-295 - Zejun Xu, Zhou Su, Qichao Xu, Qifan Qi, Tingting Yang, Jintian Li, Dongfeng Fang, Bo Han:

Delivering mobile social content with selective agent and relay nodes in content centric networks. 296-304 - Xia Feng, Chun-yan Li, De-xin Chen, Jin Tang:

A method for defensing against multi-source Sybil attacks in VANET. 305-314 - Xintao Hong, Hongbin Liang, Zengan Gao, Hongwei Li:

An adaptive resource allocation model in anti-money laundering system. 315-331 - Rong Ma

, Zhenfu Cao
:
Serial number based encryption and its application for mobile social networks. 332-339 - Wenbin Yu, Zhe Liu, Cailian Chen, Bo Yang, Xinping Guan:

Privacy-preserving design for emergency response scheduling system in medical social networks. 340-356 - Minhui Xue

, Limin Yang
, Keith W. Ross, Haifeng Qian:
Characterizing user behaviors in location-based find-and-flirt services: Anonymity and demographics - A WeChat Case Study. 357-367 - Kai Fan, Nan Ge, Yuanyuan Gong, Hui Li, Ruidan Su, Yintang Yang:

An ultra-lightweight RFID authentication scheme for mobile commerce. 368-376 - Xiaoming Wang, Yaguang Lin

, Yanxin Zhao, Lichen Zhang
, Juhua Liang, Zhipeng Cai
:
A novel approach for inhibiting misinformation propagation in human mobile opportunistic networks. 377-394 - Zehao Sun, Shaojie Tang, He Huang, Zhenyu Zhu, Hansong Guo, Yu-e Sun, Liusheng Huang:

SOS: Real-time and accurate physical assault detection using smartphone. 395-410 - Xiaoheng Deng, Genghao Li, Mianxiong Dong, Kaoru Ota

:
Finding overlapping communities based on Markov chain and link clustering. 411-420
Volume 10, Number 3, May 2017
- Yongmin Zhang, Wenchao Meng, Heng Zhang, Preetha Thulasiraman, Tom H. Luan

:
Guest editorial: Distributed control and optimization of wireless networks. 421-424 - Ruilong Deng

, Hao Liang, Jing Yong, Bo Chai, Tingting Yang:
Distributed rate control, routing, and energy management in dynamic rechargeable sensor networks. 425-439 - Yanjun Li, Lingkun Fu, You Ying, Yong Sun, Kaikai Chi, Yi-hua Zhu:

Goodput optimization via dynamic frame length and charging time adaptation for backscatter communication. 440-452 - Praveen Lalwani, Haider Banka, Chiranjeev Kumar

:
CRWO: Clustering and routing in wireless sensor networks using optics inspired optimization. 453-471 - Guangqian Xie, Kaoru Ota

, Mianxiong Dong
, Feng Pan, Anfeng Liu:
Energy-efficient routing for mobile data collectors in wireless sensor networks with obstacles. 472-483 - Chuan Zhu, Guangjie Han, Hui Zhang:

A honeycomb structure based data gathering scheme with a mobile sink for wireless sensor networks. 484-499 - Huan Zhou, Linping Tong, Tingyao Jiang, Shouzhi Xu, Jialu Fan, Ke Lv:

Maximum data delivery probability-oriented routing protocol in opportunistic mobile networks. 500-509 - Fu Xiao, Zhifei Jiang, Xiaohui Xie, Lijuan Sun, Ruchuan Wang:

An energy-efficient data transmission protocol for mobile crowd sensing. 510-518 - Tri Gia Nguyen

, Chakchai So-In
, Gia Nhu Nguyen
, Songyut Phoemphon:
A novel energy-efficient clustering protocol with area coverage awareness for wireless sensor networks. 519-536 - Wei Wang, Haoshan Shi, Dajun Wu, Pengyu Huang, Baojian Gao, Fuping Wu, Dan Xu, Xiaojiang Chen:

VD-PSO: An efficient mobile sink routing algorithm in wireless sensor networks. 537-546 - Yi-Nan Guo

, Jian Cheng, Haiyuan Liu, Dunwei Gong, Yu Xue:
A novel knowledge-guided evolutionary scheduling strategy for energy-efficient connected coverage optimization in WSNs. 547-558 - Zhuangbin Chen, Anfeng Liu, Zhetao Li, Young-June Choi, Jie Li

:
Distributed duty cycle control for delay improvement in wireless sensor networks. 559-578 - Wenjun Zhang, Bin Lin

, Qingshan Yin, Tiange Zhao:
Infrastructure deployment and optimization of fog network based on MicroDC and LRPON integration. 579-591 - Aanchal, Sushil Kumar, Omprakash Kaiwartya

, Abdul Hanan Abdullah:
Green computing for wireless sensor networks: Optimization and Huffman coding approach. 592-609 - Zhijie Ma

, Qinglin Zhao, Jun Huang:
Optimizing bandwidth allocation for heterogeneous traffic in IoT. 610-621 - Yuan Ren

, Hui Gao, Tiejun Lv:
Robust beamforming and artificial noise design in interference networks with wireless information and power transfer. 622-632 - Varun Kumar Sharma, Mahesh Kumar:

Adaptive congestion control scheme in mobile ad-hoc networks. 633-657 - Zhen Hong, Rui Wang

, Xile Li, Ning Wang:
A tree-based topology construction algorithm with probability distribution and competition in the same layer for wireless sensor network. 658-669 - Santosh Kumar Das

, Ajay Kumar Yadav, Sachin Tripathi
:
IE2M: Design of intellectual energy efficient multicast routing protocol for ad-hoc network. 670-687 - Andong Liu, Rongchao Zhang, Wen-An Zhang, You Teng:

Nash-optimization distributed model predictive control for multi mobile robots formation. 688-696 - Zhi Li, Jianhui Zhang, Xingfa Shen, Jin Fan:

Prediction based indoor fire escaping routing with wireless sensor network. 697-707 - Zhu Ren, WeiQiang Xu, Yanyun Dai, Lurong Jiang:

Multi-event Detection with Rechargeable Sensors. 708-716 - Pu Yang, Xu Pan, Jianwei Liu, Ruicheng Guo:

Optimal fault-tolerant control for UAV systems with time delay and uncertainties over wireless network. 717-725 - Dhafer Ben Arbia

, Muhammad Mahtab Alam, Rabah Attia, Elyes Ben Hamida:
ORACE-Net: A novel multi-hop body-to-body routing protocol for public safety networks. 726-749 - Jiachao Chen, Yuan Wu

, Li Ping Qian
, Hong Peng, Haibo Zhou:
Energy-efficient content distribution via mobile users cooperations in cellular networks. 750-764 - Guangsheng Feng, Yue Li, Qian Zhao, Huiqiang Wang, Hongwu Lv, Junyu Lin:

Optimizing broadcast duration for layered video streams in cellular networks. 765-779 - Tianzhang Xing, Binbin Xie, Tong Xian, Yizhi Heng, Meng Jin, Xia Zheng, Dingyi Fang

:
Treasures status monitoring based on dynamic link-sensing. 780-794 - Yourong Chen

, Siyi Lu
, Junjie Chen, Tiaojuan Ren:
Node localization algorithm of wireless sensor networks with mobile beacon node. 795-807 - Xiufang Shi, Yong Huat Chew, Chau Yuen

, Zaiyue Yang:
A novel mobile target localization algorithm via HMM-based channel sight condition identification. 808-822 - Haikuo Shen

, Kaihua Zhang, Afsoon Nejati:
A noncontact positioning measuring system based on distributed wireless networks. 823-832
Volume 10, Number 4, July 2017
- M. Milton Joe

, B. Ramakrishnan:
Novel authentication procedures for preventing unauthorized access in social networks. 833-843 - Shengke Zeng, Yong Chen, Shuangquan Tan, Mingxing He:

Concurrently deniable ring authentication and its application to LBS in VANETs. 844-856 - Priyanka Jaiswal

, Sachin Tripathi
:
An authenticated group key transfer protocol using elliptic curve cryptography. 857-864 - Jian Wang, Zhipeng Wu, Yanheng Liu, Weiwen Deng, Heekuck Oh:

Computational data privacy in wireless networks. 865-873 - Pouya Bisadi, Zahra Mirikharaji, Bradford G. Nickerson:

A fault tolerant peer-to-peer spatial data structure. 874-886 - Yao-Ren Lee, Wen-Long William Chin:

Low-complexity time synchronization for energy-constrained wireless sensor networks: Dual-Clock delayed-message approach. 887-896 - Ajay Kumar Yadav, Sachin Tripathi

:
QMRPRNS: Design of QoS multicast routing protocol using reliable node selection scheme for MANETs. 897-909 - Mohammad A. Khan, Laurent Yeh, Karine Zeitouni

, Cristian Borcea:
MobiStore: A system for efficient mobile P2P data sharing. 910-924 - Kshitiz Verma, Gianluca Rizzo

, Antonio Fernández Anta
, Rubén Cuevas Rumín
, Arturo Azcorra, Shmuel Zaks, Alberto García-Martínez
:
Energy-optimal collaborative file distribution in wired networks. 925-944 - Lingwei Xu

, Hao Zhang, T. Aaron Gulliver:
Joint TAS and power allocation for D2D cooperative networks. 945-953 - Artur Olszak:

HyCube: A distributed hash table based on a variable metric. 954-982 - Yu Zhang, Jiangtao Wen:

The IoT electric business model: Using blockchain technology for the internet of things. 983-994 - Yinbin Miao, Jianfeng Ma, Fushan Wei, Zhiquan Liu

, Xu An Wang
, Cunbo Lu:
VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel. 995-1007 - Abdelwahab Boualouache

, Samira Moussaoui:
TAPCS: Traffic-aware pseudonym changing strategy for VANETs. 1008-1020 - Hossein Mohammadi Nejad, Naser Movahhedinia, Mohammad Reza Khayyambashi:

Improving the reliability of wireless data communication in Smart Grid NAN. 1021-1033 - Preetha Thulasiraman, Grace A. Clark, Timothy M. Beach:

Applying location estimation for reliable routing in tactical unmanned ground vehicle networks. 1034-1050 - Narges Mohammadi Sarband, Mohammad Reza Khayyambashi, Naser Movahedi Nia:

Quality enhancement of video on demand implementation in peer-to-peer networks by optimum chunk length in the BitTorrent. 1051-1062 - Yang Wang

, Shuang Wu, Xiaofeng Gao, Fan Wu, Guihai Chen
:
Minimizing mobile sensor movements to form a line K-coverage. 1063-1078 - Yung-Ting Chuang:

Protecting against malicious and selective forwarding attacks for P2P search & retrieval system. 1079-1100 - Sandeep A. Thorat

, Prakash Jayanth Kulkarni:
Uncertainty analysis framework for trust based routing in MANET. 1101-1111
Volume 10, Number 5, September 2017
- Ajmery Sultana, Xavier N. Fernando

, Lian Zhao:
An overview of medium access control strategies for opportunistic spectrum access in cognitive radio networks. 1113-1141 - Xingyan Zhang:

Adaptive flow scheduling for modular datacenter networks. 1142-1151 - Praveenkumar Khethavath, Johnson P. Thomas, Eric Chan-Tin:

Towards an efficient distributed cloud computing architecture. 1152-1168 - Kun Lu, Shiyu Wang, Ling Xie, Zhen Wang

, Mingchu Li:
Modeling altruism agents: Incentive mechanism in autonomous networks with other-regarding preference. 1169-1181 - Max Bhatia

, Mritunjay Kumar Rai:
Identifying P2P traffic: A survey. 1182-1203 - Hao Hu

, Rongxing Lu, Cheng Huang, Zonghua Zhang:
PTRS: A privacy-preserving trust-based relay selection scheme in VANETs. 1204-1218 - Chuan Lin, Yuanguo Bi, Hai Zhao, Wei Cai:

Research on bottleneck-delay in internet based on IP united mapping. 1219-1231 - Ming Zhao, Arun Kumar

, Peter Han Joo Chong, Rongxing Lu:
A comprehensive study of RPL and P2P-RPL routing protocols: Implementation, challenges and opportunities. 1232-1256 - Xianfu Meng, Hongxi Meng, Tianjiao Li:

Research on the implicit feedback mechanism in peer-to-peer trust models. 1257-1269
Volume 10, Number 6, November 2017
- Editor's note: Special Issue on Mobile Ad-hoc and Sensor Networks. 1271

- Zhongnan Zhang, Lei Hu, Ming Qiu, Fangyuan Gao:

Events detection and community partition based on probabilistic snapshot for evolutionary social network. 1272-1284 - Haibin Zhang, Jiajia Liu

, Rong Li, Hua Le:
Fault diagnosis of body sensor networks using hidden Markov model. 1285-1298 - Yingfan L. Du, Lidong Wu:

Connected sensor cover and related problems. 1299-1303 - Zhenhua Duan, Cong Tian, Mengchu Zhou, Xiaobing Wang, Nan Zhang, Hongwei Du, Lei Wang:

Two-layer hybrid peer-to-peer networks. 1304-1322 - Xu-Rui Gao, Li Wang, Wei-Li Wu:

Using multi-features to recommend friends on location-based social networks. 1323-1330 - Na Ruan

, Mengyuan Li, Jie Li
:
A novel broadcast authentication protocol for internet of vehicles. 1331-1343 - Qichao Xu, Zhou Su, Zejun Xu, Dongfeng Fang, Bo Han:

Analysis to reveal evolution and topological features of a real mobile social network. 1344-1353 - Qinghe Du, Meng Liu, Qian Xu, Houbing Song

, Li Sun
, Pinyi Ren:
Interference-constrained routing over P2P-share enabled multi-hop D2D networks. 1354-1370

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














