Preprints (not yet peer-reviewed)

11 downloads
36 views

Web traffic is highly jittery and unpredictable. Load balancer plays a significant role in mitigating the uncertainty in web environments. With the growing adoption of cloud computing infrastructure, software load balancer becomes more common in recent years. Current...

["Computer Networks and Communications","Distributed and Parallel Computing","Network Science and Online Social Networks","World Wide Web and Web Science","Software Engineering"]
doi:10.7287/peerj.preprints.26875v1
254 downloads
188 views

This survey focuses on authentication methods for the Internet of Things (IoT). There are many different authentication methods that are used in the IT industry but not all of these can be adapted for the IoT. Lightweight and mutual authentication methods will...

["Computer Networks and Communications","Cryptography","Embedded Computing","Security and Privacy"]
doi:10.7287/peerj.preprints.26474v1
92 downloads
172 views

Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet...

["Computer Networks and Communications","Embedded Computing","Emerging Technologies","Security and Privacy"]
doi:10.7287/peerj.preprints.26473v1
64 downloads
131 views

In modern as well as ancient ciphers of public key cryptography, substitution boxes find a permanent seat. Generation and cryptanalysis of 4-bit as well as 8-bit crypto S-boxes is of utmost importance in modern cryptography. In this paper, a detailed review of...

["Computer Networks and Communications","Cryptography"]
doi:10.7287/peerj.preprints.26452v1
41 downloads
127 views

4-bit Linear Relations play an important role in Cryptanalysis of 4-bit Bijective Crypto S-boxes. 4-bit finite differences also a major part of cryptanalysis of 4-bit substitution boxes. Count of existence of all 4-bit linear relations, for all of 16 input and...

["Computer Networks and Communications","Cryptography"]
doi:10.7287/peerj.preprints.3441v1
76 downloads
258 views

Password authentication is an essential and widespread form of user authentication on the Internet with no other authentication system matching its dominance. When a password on one website is breached, if reused, the stolen password can be used to gain access...

["Computer Networks and Communications","Security and Privacy"]
doi:10.7287/peerj.preprints.3322v1
258 downloads
1,259 views

We describe best practices for providing convenient, high-speed, secure access to large data via research data portals. We capture these best practices in a new design pattern, the Modern Research Data Portal, that disaggregates the traditional monolithic web-based...

["Computer Networks and Communications","Data Science","Distributed and Parallel Computing","Security and Privacy","World Wide Web and Web Science"]
doi:10.7287/peerj.preprints.3194v2
161 downloads
207 views

Advanced Persistent Threat (APT) is one of the most serious types of cyber attacks, which is a new and more complex version of multi-step attack. Within the APT life cycle, the most common technique used to get the point of entry is spear-phishing emails which...

["Computer Networks and Communications","Security and Privacy"]
doi:10.7287/peerj.preprints.2998v1
213 downloads
284 views

Transferring a huge amount of data between different network locations over the network links depends on the heterogeneous wireless network. Such a network consists of several networks with different access technologies. Traditionally, a mobile device may be moved...

["Computer Networks and Communications","Mobile and Ubiquitous Computing","Network Science and Online Social Networks"]
doi:10.7287/peerj.preprints.2970v1
407 downloads
1,810 views

The timely publication of scientific results is essential for dynamic advances in science. The ubiquitous availability of computers which are connected to a global network made the rapid and low-cost distribution of information through electronic channels possible....

["Human-Computer Interaction","Computer Education","Computer Networks and Communications","Digital Libraries","World Wide Web and Web Science"]
doi:10.7287/peerj.preprints.2648v2
289 downloads
1,203 views

"Publication forms the core structure supporting the development and transmission of scientific knowledge" (Galbraith2015). Yet, with the WorldWideWeb a dominant part of current scientific publication and information-dissemination, internet "publication" is still...

["Adaptive and Self-Organizing Systems","Computer Education","Computer Networks and Communications","Digital Libraries","World Wide Web and Web Science"]
doi:10.7287/peerj.preprints.1568v13
3,829 downloads
2,169 views

The rapid growth of small Internet connected devices, known as the Internet of Things (IoT), is creating a new set of challenges to create secure, private infrastructures. This paper reviews the current literature on the challenges and approaches to security and...

["Computer Networks and Communications","Embedded Computing","Real-Time and Embedded Systems","Security and Privacy","World Wide Web and Web Science"]
doi:10.7287/peerj.preprints.1241v2
128 downloads
390 views

In this paper we introduce SNF, a framework that synthesizes (S) network function (NF) service chains by eliminating redundant I/O and repeated elements, while consolidating stateful cross layer packet operations across the chain. SNF uses graph composition and...

["Computer Networks and Communications"]
doi:10.7287/peerj.preprints.2477v3
77 downloads
239 views

This paper introduces a renewed gateway to ENEAGRID distributed computing resources, named Fast Access to Remote Objects 2.0 (FARO 2.0). FARO 2.0 is a tool for application and desktop virtualization with a strong focus towards user experience (UX), providing trained...

["Human-Computer Interaction","Computer Networks and Communications","Distributed and Parallel Computing","World Wide Web and Web Science"]
doi:10.7287/peerj.preprints.2537v1
85 downloads
323 views

Hypertension or high blood pressure is a condition on the rise. Not only does it affect the elderly but is also increasingly spreading to younger sectors of the population. Treating it involves exhaustive monitoring of patients. A tool adapted to the particular...

["Computer Networks and Communications","Distributed and Parallel Computing"]
doi:10.7287/peerj.preprints.2073v1
What is a PeerJ Preprint?

A PeerJ Preprint is a draft of an article, abstract, or poster that has not yet been peer-reviewed for formal publication. Submit a draft, incomplete, or final version of your work for free.

Submissions today can be approved by Editorial Staff and online in 24 hours.

Establish precedent. Solicit feedback. Publish updates.

Refine by manuscript type

Top subject areas - Preprints

Top subject areas - People

View all subject areas