Works matching IS 19366442 AND DT 2025 AND VI 18 AND IP 3
Results: 43
SHO-CH: Spotted hyena optimization for cluster head selection to optimize energy in wireless sensor network.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-025-01949-2
- By:
- Publication type:
- Article
Secure traffic data sharing in UAV-assisted VANET through certificateless proxy re-encryption and consortium blockchain.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-025-01920-1
- By:
- Publication type:
- Article
ADPHE-FL: Federated learning method based on adaptive differential privacy and homomorphic encryption.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-025-01962-5
- By:
- Publication type:
- Article
Automatic modulation classification scheme for next-generation cellular networks using optimized adaptive multi-scale dual attention network.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-025-01959-0
- By:
- Publication type:
- Article
Articulation of blockchain enabled e-voting systems: a systematic literature review.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-025-01956-3
- By:
- Publication type:
- Article
Mudscan: Double authentication based secure control mechanism for MUD enable IoT networks.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-025-01923-y
- By:
- Publication type:
- Article
Enabling privacy-preserving and distributed intelligent credit scoring by zero-knowledge proof and functional encryption.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-025-01963-4
- By:
- Publication type:
- Article
An efficient multi-party signature for securing blockchain wallet.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-025-01958-1
- By:
- Publication type:
- Article
RL-BOT—Reinforcement learning based billfish optimization technique for secured data aggregation in internet of things.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-025-01957-2
- By:
- Publication type:
- Article
A Secure, lightweight, and verifiable data aggregation scheme for smart grids.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-025-01960-7
- By:
- Publication type:
- Article
Deep learning based Enhanced Data Aggregation with Multi-Objective Optimization method in Wireless Sensor Networks.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-025-01943-8
- By:
- Publication type:
- Article
FinSec: A Consortium Blockchain-Enabled Privacy-Preserving and Scalable Framework For Customer Data Protection In FinTech.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-025-01955-4
- By:
- Publication type:
- Article
Secure and interoperable EHR management via hyperledger fabric: The Mrblock framework.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-025-01954-5
- By:
- Publication type:
- Article
Resilient wireless sensor networks in industrial contexts via energy-efficient optimization and trust-based secure routing.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-025-01946-5
- By:
- Publication type:
- Article
Network security based combined CNN-RNN models for IoT intrusion detection system.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-025-01944-7
- By:
- Publication type:
- Article
Integrating ABHA for authentication and key exchange: A hybrid security framework for smart healthcare in India.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-024-01868-8
- By:
- Publication type:
- Article
Security-aware, Red fox optimization-based cluster-based routing in wireless sensor network.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-025-01951-8
- By:
- Publication type:
- Article
Paths in the cloud: Geolocation mapping of Amazon’s cross-border connectivity.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-024-01874-w
- By:
- Publication type:
- Article
Green secure land registration scheme for blockchain-enabled agriculture industry 5.0.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-025-01953-6
- By:
- Publication type:
- Article
Energy-efficient OFDMA resource allocation in HetNets using discrete particle swarm optimization.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-025-01914-z
- By:
- Publication type:
- Article
An intrusion detection imbalanced data classification algorithm based on CWGAN-GP oversampling.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-025-01938-5
- By:
- Publication type:
- Article
Optimal incentive mechanism design for short video collaborative caching system in mobile edge networks based on contract theory.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-025-01950-9
- By:
- Publication type:
- Article
Dependency-aware task collaborative offloading and resource allocation in UAV enabled edge computing.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-025-01903-2
- By:
- Publication type:
- Article
A multi-objective approach for secure cluster based routing & attack classification in VANETs.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-024-01895-5
- By:
- Publication type:
- Article
Enhanced security data management in power grids using deep learning with genetic algorithm-based hyperparameter optimization.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-025-01936-7
- By:
- Publication type:
- Article
Efficient energy management in wireless sensor networks based on optimized explicit feature interaction-aware graph neural network.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-025-01927-8
- By:
- Publication type:
- Article
Radio frequency fingerprint identification towards statistical and deep learning features: Review, recent results and future directions.
- Published in:
- 2025
- By:
- Publication type:
- Literature Review
Forwarding information base construction and hybrid data transmission for information-centric IoT.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-025-01925-w
- By:
- Publication type:
- Article
An AI-based approach for dynamic routing in IoT networks.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-025-01942-9
- By:
- Publication type:
- Article
Collaborative path penetration in 5G-IoT networks: A multi-agent deep reinforcement learning approach.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-025-01939-4
- By:
- Publication type:
- Article
Efficient blockchain interoperability design for cross-chain transactions in future internet-of-value.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-025-01941-w
- By:
- Publication type:
- Article
Cryptanalysis and amendment of authenticated key exchange protocol for mobile devices.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-025-01937-6
- By:
- Publication type:
- Article
Efficient dynamic-committee BFT consensus based on HotStuff.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-025-01934-9
- By:
- Publication type:
- Article
Sustaining immutability in pharmaceutical cold supply chain integrating quantum blockchain.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-025-01930-z
- By:
- Publication type:
- Article
Grey wolf optimizer with softmax-regressed and tanimoto reweight for AI-ML-based wireless sensor network routing.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-025-01924-x
- By:
- Publication type:
- Article
RDDNS: A domain name system for robust dynamic address resolution.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-025-01931-y
- By:
- Publication type:
- Article
Correction to: Optimized auxiliary physics neural network based multi‑target detection for edge‑cloud in smart internet of things.
- Published in:
- 2025
- By:
- Publication type:
- Correction Notice
Hyperledger fabric based remote patient monitoring solution and performance evaluation.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-025-01921-0
- By:
- Publication type:
- Article
A ring signature scheme with linkability and traceability for blockchain-based medical data sharing system.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-025-01913-0
- By:
- Publication type:
- Article
Computation offloading and pricing strategy for heterogeneous multicell network with mobile edge computing.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-025-01926-9
- By:
- Publication type:
- Article
A key leakage resistant linearly homomorphic signature scheme and its application.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-025-01917-w
- By:
- Publication type:
- Article
Blockchain technology to improve traceability of data exchanges in the Judicial system: A road traffic accident victims as use case.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-024-01900-x
- By:
- Publication type:
- Article
An efficient privacy-preserving authentication scheme for internet of vehicles based on blockchain technology with hybrid adaptive network.
- Published in:
- Peer-to-Peer Networking & Applications, 2025, v. 18, n. 3, p. 1, doi. 10.1007/s12083-024-01864-y
- By:
- Publication type:
- Article