Works matching IS 19366442 AND DT 2025 AND VI 18 AND IP 1
Results: 48
BT-CNV: A distributed and decentralized solution for certificate notarization and verification for academia using public blockchain.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01889-3
- By:
- Publication type:
- Article
HML-BFT: Hybrid multi-layer BFT consensus with reputation model for large-scale blockchain.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01888-4
- By:
- Publication type:
- Article
CLGR: Connectivity and link quality aware geographical routing using AHP-TOPSIS for FANETs.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01879-5
- By:
- Publication type:
- Article
Reinforcement Q-learning enabled energy-efficient service function chain provisioning in multi-domain networks.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01861-1
- By:
- Publication type:
- Article
A joint task caching and computation offloading scheme based on deep reinforcement learning.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01836-2
- By:
- Publication type:
- Article
The real estate tokenized investment system based on ethereum blockchain.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01828-2
- By:
- Publication type:
- Article
OREVI_PCH: An optimized resource-efficient redaction mechanism with integrity validation in policy-based chameleon hash for IoT applications.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01884-8
- By:
- Publication type:
- Article
A multi-cycle recursive clustering algorithm for the analysis of social media data streams.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01826-4
- By:
- Publication type:
- Article
SecShield: An IoT access control framework with edge caching using software defined network.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01825-5
- By:
- Publication type:
- Article
Enhanced DGA detection in Botnet traffic: leveraging N-Gram, topic modeling, and attention BiLSTM.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01822-8
- By:
- Publication type:
- Article
Blockchain-driven security for IoT networks: State-of-the-art, challenges and future directions.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01812-w
- By:
- Publication type:
- Article
Design of secure and unique addressing with mutual authentication scheme in IoT networks.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01882-w
- By:
- Publication type:
- Article
Blockchain-oriented secure communication and smart parking model for internet of electric vehicles in smart cities.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01872-y
- By:
- Publication type:
- Article
Chebyshev chaotic map with attribute based encryption on session based data-sharing in fog environment.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01841-5
- By:
- Publication type:
- Article
Performance analysis of D2D cooperative networks based on probabilistic relay forwarding mechanism.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01885-7
- By:
- Publication type:
- Article
Security resource allocation in blockchain-based IoT.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01852-2
- By:
- Publication type:
- Article
Unveiling bitcoin network attack using deep reinforcement learning with Boltzmann exploration.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01829-1
- By:
- Publication type:
- Article
Coot-feedback artificial tree-based energy-aware electric vehicle charge scheduling algorithm.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01816-6
- By:
- Publication type:
- Article
A privacy-preserving method for cross-chain interoperability using homomorphic encryption.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01813-9
- By:
- Publication type:
- Article
Dynamical repair strategy of data network controllability processes against DoS attack on complex temporal networks.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01834-4
- By:
- Publication type:
- Article
IoT-based smart healthcare using efficient data gathering and data analysis.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01823-7
- By:
- Publication type:
- Article
An intelligent sailfish optimization based fault diagnosis and classification in wireless sensor networks.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01814-8
- By:
- Publication type:
- Article
Smart contract empowered dynamic consent: decentralized storage and access control for healthcare applications.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01827-3
- By:
- Publication type:
- Article
A data encryption and file sharing framework among microservices-based edge nodes with blockchain.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01856-y
- By:
- Publication type:
- Article
Efficient anti-quantum attack batch authentication and key agreement protocol based on NTRU in VANET.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01824-6
- By:
- Publication type:
- Article
A scalable identity management scheme via blockchain: Identity protection and traceability.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01866-w
- By:
- Publication type:
- Article
An efficient propagation algorithm based on node clustering and seed node selection in a blockchain network.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01854-0
- By:
- Publication type:
- Article
A novel secure supply chain for smart healthcare systems: An approach to leverage blockchain, Keccak-256, and ZKP for drug safety assurance.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01832-6
- By:
- Publication type:
- Article
Hague: a hybrid scaling stateless blockchain.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01831-7
- By:
- Publication type:
- Article
GTD3-NET: A deep reinforcement learning-based routing optimization algorithm for wireless networks.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01851-3
- By:
- Publication type:
- Article
Enhancing intrusion detection in MANETs with blockchain-based trust management and enhanced GRU model.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01877-7
- By:
- Publication type:
- Article
PB-Raft: A Byzantine fault tolerance consensus algorithm based on weighted PageRank and BLS threshold signature.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01876-8
- By:
- Publication type:
- Article
Optimized stochastic particle swarm optimization integrated ranked backoff medium access control for optimal route selection in wireless sensor networks.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01837-1
- By:
- Publication type:
- Article
Efficient privacy-preserving federated logistic regression with poor-quality users.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01840-6
- By:
- Publication type:
- Article
Heterogeneity-aware device selection for clustered federated learning in IoT.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01869-7
- By:
- Publication type:
- Article
NEIL: aN EfficIent cLuster-based device discovery for D2D communication in B5G.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01860-2
- By:
- Publication type:
- Article
Differential privacy preserving based framework using blockchain for internet-of-things.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01858-w
- By:
- Publication type:
- Article
An enhanced deep learning integrated blockchain framework for securing industrial IoT.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01857-x
- By:
- Publication type:
- Article
IoV-SFL: A blockchain-based federated learning framework for secure and efficient data sharing in the internet of vehicles.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01821-9
- By:
- Publication type:
- Article
WikiChain: An improved resilient, pseudo-transparent knowledge base.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01871-z
- By:
- Publication type:
- Article
A sustainable mutual authentication protocol for IoT-Fog-Cloud environment.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01843-3
- By:
- Publication type:
- Article
A secure and lightweight data sharing scheme in vehicular digital twin network.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01833-5
- By:
- Publication type:
- Article
Parallel Byzantine fault tolerance consensus based on trusted execution environments.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01830-8
- By:
- Publication type:
- Article
Trust-based resource allocation and task splitting in ultra-dense mobile edge computing network.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01873-x
- By:
- Publication type:
- Article
Multimodal data privacy protection and completeness verification method for mobile crowd sensing.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01850-4
- By:
- Publication type:
- Article
Fine-grained data deletion supporting dynamic data insertion for cloud storage.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01818-4
- By:
- Publication type:
- Article
A study on the application of the T5 large language model in encrypted traffic classification.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01817-5
- By:
- Publication type:
- Article
EEPS: Optimizing energy-efficient path selection in the Internet of Battlefield Things (IoBT) utilizing SDN.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 1, p. 1, doi. 10.1007/s12083-024-01809-5
- By:
- Publication type:
- Article