Peer-to-Peer Networking and Applications

Papers
(The TQCC of Peer-to-Peer Networking and Applications is 7. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Blockchain smart contracts: Applications, challenges, and future trends273
Optimized dynamic storage of data (ODSD) in IoT based on blockchain for wireless sensor networks120
Secure and efficient mutual authentication protocol for smart grid under blockchain89
A trust infrastructure based authentication method for clustered vehicular ad hoc networks84
An Optimized Byzantine Fault Tolerance Algorithm for Consortium Blockchain72
A novel multi-objective optimization strategy for enhancing quality of service in IoT-enabled WSN applications69
Reliable data dissemination for the Internet of Things using Harris hawks optimization59
Machine learning models and techniques for VANET based traffic management: Implementation issues and challenges59
Penetration testing framework for smart contract Blockchain54
Task scheduling in cloud-fog computing systems52
Privacy-preserving neural networks with Homomorphic encryption: Challenges and opportunities49
A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks48
An effective blockchain evaluation system based on entropy-CRITIC weight method and MCDM techniques48
An energy-efficient cluster-based routing protocol using unequal clustering and improved ACO techniques for WSNs47
BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology46
An efficient clustering-based anonymization scheme for privacy-preserving data collection in IoT based healthcare services45
A digital rights management system based on a scalable blockchain43
A robust and lightweight secure access scheme for cloud based E-healthcare services42
Multipath routing through the firefly algorithm and fuzzy logic in wireless sensor networks41
A review on resource allocation techniques in D2D communication for 5G and B5G technology37
Blockchain-based Secure and Intelligent Sensing Scheme for Autonomous Vehicles Activity Tracking Beyond 5G Networks37
Adaptive privacy-preserving federated learning37
A reliable tree-based data aggregation method in wireless sensor networks36
Reliable scheduling and load balancing for requests in cloud-fog computing33
Content caching based on mobility prediction and joint user Prefetch in Mobile edge networks33
ASFGNN: Automated separated-federated graph neural network32
A novel reputation incentive mechanism and game theory analysis for service caching in software-defined vehicle edge computing31
Attribute-based encryption with outsourced decryption in blockchain30
Privacy preserving E-voting cloud system based on ID based encryption30
Energy efficiency maximization for beyond 5G NOMA-enabled heterogeneous networks28
A survey for the application of blockchain technology in the media28
A Grey-Wolf based Optimized Clustering approach to improve QoS in wireless sensor networks for IoT applications28
FAST: Fast Accessing Scheme for data Transmission in cloud computing28
Hybrid data transmission scheme based on source node centrality and community reconstruction in opportunistic social networks28
RETRACTED ARTICLE: Secure access control for manufacturing sector with application of ethereum blockchain28
User authentication using Blockchain based smart contract in role-based access control27
Enhanced attribute based access control with secure deduplication for big data storage in cloud26
A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things26
A secure authentication scheme for IoT application in smart home26
BacS: A blockchain-based access control scheme in distributed internet of things25
Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment25
A Robust user authentication protocol with privacy-preserving for roaming service in mobility environments24
Research on secure transmission and storage of energy IoT information based on Blockchain23
A localization and deployment model for wireless sensor networks using arithmetic optimization algorithm23
Blockchain-based digitization of land record through trust value-based consensus algorithm23
MDRP: Message dissemination with re-route planning method for emergency vehicle information exchange22
Cloud-connected flying edge computing for smart agriculture22
Information transmission mode and IoT community reconstruction based on user influence in opportunistic s ocial networks21
A secure vehicle theft detection framework using Blockchain and smart contract21
A hybrid ANFIS reptile optimization algorithm for energy-efficient inter-cluster routing in internet of things-enabled wireless sensor networks21
Energy Efficient Mode Selection, Base Station Selection and Resource Allocation Algorithm in D2D Heterogeneous Networks21
Cellular traffic prediction on blockchain-based mobile networks using LSTM model in 4G LTE network21
HonestChain: Consortium blockchain for protected data sharing in health information systems20
An improved steganography without embedding based on attention GAN20
Privacy-preserving hierarchical deterministic key generation based on a lattice of rings in public blockchain20
Behavior prediction based on interest characteristic and user communication in opportunistic social networks20
Low energy consumption routing algorithm based on message importance in opportunistic social networks20
EdgeTC - a PBFT blockchain-based ETC scheme for smart cities20
Cancelable Iris template for secure authentication based on random projection and double random phase encoding19
An experimental study on performance of private blockchain in IoT applications19
Analysis of intrusion detection in cyber attacks using DEEP learning neural networks19
Joint computation offloading and deployment optimization in multi-UAV-enabled MEC systems19
A provably secure RFID authentication protocol based on ECQV for the medical internet of things19
Trust based task offloading scheme in UAV-enhanced edge computing network19
Deep learning application for sensing available spectrum for cognitive radio: An ECRNN approach18
Hybrid conditional privacy-preserving authentication scheme for VANETs18
A donation tracing blockchain model using improved DPoS consensus algorithm18
EM_WOA: A budget-constrained energy consumption optimization approach for workflow scheduling in clouds18
Cryptocurrencies activity as a complex network: Analysis of transactions graphs18
A differential moth flame optimization algorithm for mobile sink trajectory17
Deep learning based modulation classification for 5G and beyond wireless systems17
Obfuscation-based location privacy-preserving scheme in cloud-enabled internet of vehicles17
Obfuscation of images via differential privacy: From facial images to general images16
SDN-based offloading policy to reduce the delay in fog-vehicular networks16
Secure medical data sharing scheme based on traceable ring signature and blockchain15
A decentralized vehicle anti-theft system using Blockchain and smart contracts15
An efficient three-factor remote user authentication protocol based on BPV-FourQ for internet of drones15
An intelligent traffic prediction framework for 5G network using SDN and fusion learning15
Design and implementation of blockchain-based digital advertising media promotion system15
Efficient privacy-preserving authentication for V2G networks15
A lightweight continuous authentication scheme for medical wireless body area networks15
A certificateless encryption scheme based on blockchain15
Blockchain based Privacy Preserving User Authentication Protocol for Distributed Mobile Cloud Environment15
Hybrid meta-heuristic techniques based efficient charging scheduling scheme for multiple Mobile wireless chargers based wireless rechargeable sensor networks14
An integrative approach for secure data sharing in vehicular edge computing using Blockchain14
Privacy-preserving for the internet of things in multi-objective task scheduling in cloud-fog computing using goal programming approach14
AC-RDV: a novel ant colony system for roadside units deployment in vehicular ad hoc networks14
Influencing factors analysis in pear disease recognition using deep learning14
Achieving reliable timestamp in the bitcoin platform14
A double steganography model combining blockchain and interplanetary file system14
BCPPT: A blockchain-based privacy-preserving and traceability identity management scheme for intellectual property14
A two-level clustering based on fuzzy logic and content-based routing method in the internet of things13
Particle swarm optimization based sleep scheduling and clustering protocol in wireless sensor network13
SAES: A self-checking authentication scheme with higher efficiency and security for VANET13
CP-ABSEL: Ciphertext-policy attribute-based searchable encryption from lattice in cloud storage13
EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things13
An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy13
Path loss modelling at 60 GHz mmWave based on cognitive 3D ray tracing algorithm in 5G13
Accessible review of internet of vehicle models for intelligent transportation and research gaps for potential future directions13
Efficient caching method in fog computing for internet of everything13
IoT malware: An attribute-based taxonomy, detection mechanisms and challenges13
Lightweight and secure PUF-based authenticated key agreement scheme for smart grid13
Blockchain-based solution for Secure and Transparent Food Supply Chain Network12
Joint computation offloading and resource allocation in vehicular edge computing based on an economic theory: walrasian equilibrium12
Link reliability-based multi-hop directional location routing in vehicular ad hoc network12
A Blockchain enabled location-privacy preserving scheme for vehicular ad-hoc networks12
Privacy-preserving two-parties logistic regression on vertically partitioned data using asynchronous gradient sharing12
Impact of data correlation on privacy budget allocation in continuous publication of location statistics12
AMVchain: authority management mechanism on blockchain-based voting systems12
Security improvement in block chain technique enabled peer to peer network for beyond 5G and internet of things12
On the issues of selective jamming in IEEE 802.15.4-based wireless body area networks12
Data-driven peer-to-peer blockchain framework for water consumption management12
An efficient and privacy-preserving mutual authentication with key agreement scheme for telecare medicine information system12
Backdoors hidden in facial features: a novel invisible backdoor attack against face recognition systems12
RETRACTED ARTICLE: Issues of crowdsourcing and mobile app development through the intellectual property protection of third parties12
A uniformization-based approach to preserve individuals’ privacy during process mining analyses12
All-in-one: Toward hybrid data collection and energy saving mechanism in sensing-based IoT applications12
CEDAR: A cluster-based energy-aware data aggregation routing protocol in the internet of things using capuchin search algorithm and fuzzy logic11
Optimal task partitioning, Bit allocation and trajectory for D2D-assisted UAV-MEC systems11
A novel geographically distributed architecture based on fog technology for improving Vehicular Ad hoc Network (VANET) performance11
Real-time reliable clustering and secure transmission scheme for QoS development in MANET11
SynergyGrids: blockchain-supported distributed microgrid energy trading11
A secure peer to peer multiparty transaction scheme based on blockchain11
URASP: An ultralightweight RFID authentication scheme using permutation operation11
Optimize the placement of edge server between workload balancing and system delay in smart city11
Reinforcement-Learning based energy efficient optimized routing protocol for WSN11
Dynamic Sectorization and parallel processing for device-to-device (D2D) resource allocation in 5G and B5G cellular network11
A self-localization range free protocol for wireless sensor networks11
Anonymized noise addition in subspaces for privacy preserved data mining in high dimensional continuous data11
Systematic study of topology control methods and routing techniques in wireless sensor networks11
Desynchronization resistant privacy preserving user authentication protocol for location based services11
An efficient secure data compression technique based on chaos and adaptive Huffman coding11
Blind signcryption scheme based on hyper elliptic curves cryptosystem10
BCAV: Blockchain-based certificateless authentication system for vehicular network10
A dynamic and verifiable multi-keyword ranked search scheme in the P2P networking environment10
A probability based energy competent cluster based secured ch selection routing EC2SR protocol for smart dust10
AToM: Active topology monitoring for the bitcoin peer-to-peer network10
A blockchain-based framework for privacy-preserving and verifiable billing in smart grid10
Trust and scalable blockchain-based message exchanging scheme on VANET10
Verifiable dynamic ranked search with forward privacy over encrypted cloud data10
A secure three-factor anonymous roaming authentication protocol using ECC for space information networks10
Privacy-aware smart card based biometric authentication scheme for e-health10
Efficient and secure k-nearest neighbor query on outsourced data10
Energy aware MAC protocol with mobility management in wireless body area network10
From edge data to recommendation: A double attention-based deformable convolutional network9
An Edge-Fog-Cloud computing architecture for IoT and smart metering data9
Trust estimation in peer-to-peer network using BLUE9
Sparse auto encoder driven support vector regression based deep learning model for predicting network intrusions9
CSNN: Password guessing method based on Chinese syllables and neural network9
Efficient and privacy-preserving range-max query in fog-based agricultural IoT9
Improved community structure discovery algorithm based on combined clique percolation method and K-means algorithm9
Fog-assisted hierarchical data routing strategy for IoT-enabled WSN: Forest fire detection9
Analyzing and eliminating phishing threats in IoT, network and other Web applications using iterative intersection9
QoS optimization through PBMR algorithm in multipath wireless multimedia sensor networks9
A novel heuristic based energy efficient routing strategy in wireless sensor network9
Energy-efficient client selection in federated learning with heterogeneous data on edge9
Achieving IoT data security based blockchain9
Privacy preserving in indoor fingerprint localization and radio map expansion9
Themis: An accountable blockchain-based P2P cloud storage scheme9
SRAF: Scalable Resource Allocation Framework using Machine Learning in user-Centric Internet of Things9
Combinatorial auction based multi-task resource allocation in fog environment using blockchain and smart contracts9
An Application of blockchain to securely acquire, diagnose and share clinical data through smartphone9
EICache: A learning-based intelligent caching strategy in mobile edge computing9
Enabling rank-based distribution of microservices among containers for green cloud computing environment9
A machine learning-assisted data aggregation and offloading system for cloud–IoT communication9
Data analytics and the P2P cloud: an integrated model for strategy formulation based on customer behaviour8
Joint optimization of task caching and computation offloading in vehicular edge computing8
Distributed Address Table (DAT): A Decentralized Model for End-to-End Communication in IoT8
Surface and high-altitude combined rainfall forecasting using convolutional neural network8
An enhanced bacterial foraging optimization algorithm for secure data storage and privacy-preserving in cloud8
Stable zone-based 5G clustered MANET using interest-region-based routing and gateway selection8
A DNN inference acceleration algorithm combining model partition and task allocation in heterogeneous edge computing system8
Efficient path-sense transmission based on IoT system in opportunistic social networks8
BESDDFFS: Blockchain and EdgeDrone based secured data delivery for forest fire surveillance8
Smart contract and IPFS-based trustworthy secure data storage and device authentication scheme in fog computing environment8
Enhanced petri nets for traceability of food management using internet of things8
Location privacy-preserving in online taxi-hailing services8
An energy balanced and nodes aware routing protocol for energy harvesting wireless sensor networks8
Hybrid fuzzy logic and artificial Flora optimization algorithm-based two tier cluster head selection for improving energy efficiency in WSNs8
Tracing of online assaults in 5G networks using dominance based rough set and formal concept analysis8
Identity based two-party authenticated key agreement scheme for vehicular ad hoc networks8
New incentive mechanism to enhance cooperation in wireless P2P networks8
A two-phase fuzzy based access network selection scheme for vehicular ad hoc networks8
Efficient topology control of blockchain peer to peer network based on SDN paradigm8
A novel energy-efficient balanced multi-hop routing scheme (EBMRS) for wireless sensor networks7
Analysis and mathematical modeling of big data processing7
Computing tasks assignment optimization among edge computing servers via SDN7
Energy efficient clustering with compressive sensing for underwater wireless sensor networks7
Quantitative understanding serial-parallel hybrid sfc services: a dependability perspective7
Cryptographically secure privacy-preserving authenticated key agreement protocol for an IoT network: A step towards critical infrastructure protection7
Toward efficient and effective bullying detection in online social network7
A trust based energy and mobility aware routing protocol to improve infotainment services in VANETs7
An analytical model for churn process in Bitcoin network with ordinary and relay nodes7
A reputation-based cooperative content delivery with parking vehicles in vehicular ad-hoc networks7
Secure data sharing using Merkle hash digest based blockchain identity management7
Resource discovery mechanisms in pure unstructured peer-to-peer systems: a comprehensive survey7
Research on improvement of DPoS consensus mechanism in collaborative governance of network public opinion7
Data transmission scheme based on node model training and time division multiple access with IoT in opportunistic social networks7
Relay selection and power allocation for energy-load efficient network-coded cooperative unicast D2D communications7
Reputation management in vehicular network using blockchain7
Fault-Tolerant indoor localization based on speed conscious recurrent neural network using Kullback–Leibler divergence7
A trust-based privacy-preserving friend matching scheme in social Internet of Vehicles7
Energy-effective artificial internet-of-things application deployment in edge-cloud systems7
LKM-AMI: A Lightweight Key Management Scheme for Secure two Way Communications between Smart Meters and HAN Devices of AMI System in Smart Grid7
A framework for the identification of suspicious packets to detect anti-forensic attacks in the cloud environment7
Multi-attributes based energy efficient clustering for enhancing network lifetime in WSN’s7
Three-stage Stackelberg game based edge computing resource management for mobile blockchain7
Cluster and angular based energy proficient trusted routing protocol for mobile ad-hoc network7
ATS-LIA: A lightweight mutual authentication based on adaptive trust strategy in flying ad-hoc networks7
An optimal load balancing strategy for P2P network using chicken swarm optimization7
MASK: Efficient and privacy-preserving m-tree based biometric identification over cloud7
A blockchain-based dynamic searchable symmetric encryption scheme under multiple clouds7
NTSC: a novel trust-based service computing scheme in social internet of things7
A blockchain-based data storage framework: A rotating multiple random masters and error-correcting approach7
A certificateless linearly homomorphic signature scheme for network coding and its application in the IoT7
0.027503967285156