Preprints (not yet peer-reviewed)

40 downloads
69 views

The Internet of Things is a telecommunication phenomenon which has been introduced during these years, wherein every physical thing would be equipped with electronic parts such as transceivers, sensors, Microcontrollers, RFID, actuators, and proper procedures that...

["Computer Networks and Communications","Real-Time and Embedded Systems"]
doi:10.7287/peerj.preprints.27087v1
186 downloads
328 views

Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet...

["Computer Networks and Communications","Embedded Computing","Emerging Technologies","Security and Privacy"]
doi:10.7287/peerj.preprints.26473v2
48 downloads
113 views

Mobile Cloud Computing (MCC) is a recent technological development, which has emerged from two popular technology trends; mobile computing and cloud. In essence it revolutionises the capabilities of mobile devices by integrating both storage and processing of the...

["Computer Networks and Communications","Distributed and Parallel Computing","Mobile and Ubiquitous Computing"]
doi:10.7287/peerj.preprints.27050v1
713 downloads
328 views

This survey focuses on authentication methods for the Internet of Things (IoT). There are many different authentication methods that are used in the IT industry but not all of these can be adapted for the IoT. Lightweight and mutual authentication methods will...

["Computer Networks and Communications","Cryptography","Embedded Computing","Security and Privacy"]
doi:10.7287/peerj.preprints.26474v2
287 downloads
409 views

Advanced Persistent Threat (APT) is one of the most serious types of cyber attacks, which is a new and more complex version of multi-step attack. Within the APT life cycle, the most common technique used to get the point of entry is spear-phishing emails which...

["Computer Networks and Communications","Security and Privacy"]
doi:10.7287/peerj.preprints.2998v2
1,226 downloads
2,415 views

As open access to publications continues to gather momentum we should continuously question whether it is moving in the right direction. A novel intervention in this space is the creation of open access publishing platforms commissioned by funding organisations....

["Computer Networks and Communications","Social Computing"]
doi:10.7287/peerj.preprints.26954v1
504 downloads
579 views

A problem facing healthcare record systems throughout the world is how to share the medical data with more stakeholders for various purposes without sacrificing data privacy and integrity. Blockchain, operating in a state of consensus, is the underpinning technology...

["Computer Networks and Communications","Cryptography","Data Science","Security and Privacy"]
doi:10.7287/peerj.preprints.26942v1
86 downloads
285 views

Web traffic is highly jittery and unpredictable. Load balancer plays a significant role in mitigating the uncertainty in web environments. With the growing adoption of cloud computing infrastructure, software load balancer becomes more common in recent years. Current...

["Computer Networks and Communications","Distributed and Parallel Computing","Network Science and Online Social Networks","World Wide Web and Web Science","Software Engineering"]
doi:10.7287/peerj.preprints.26875v1
141 downloads
242 views

In modern as well as ancient ciphers of public key cryptography, substitution boxes find a permanent seat. Generation and cryptanalysis of 4-bit as well as 8-bit crypto S-boxes is of utmost importance in modern cryptography. In this paper, a detailed review of...

["Computer Networks and Communications","Cryptography"]
doi:10.7287/peerj.preprints.26452v1
122 downloads
180 views

4-bit Linear Relations play an important role in Cryptanalysis of 4-bit Bijective Crypto S-boxes. 4-bit finite differences also a major part of cryptanalysis of 4-bit substitution boxes. Count of existence of all 4-bit linear relations, for all of 16 input and...

["Computer Networks and Communications","Cryptography"]
doi:10.7287/peerj.preprints.3441v1
124 downloads
386 views

Password authentication is an essential and widespread form of user authentication on the Internet with no other authentication system matching its dominance. When a password on one website is breached, if reused, the stolen password can be used to gain access...

["Computer Networks and Communications","Security and Privacy"]
doi:10.7287/peerj.preprints.3322v1
309 downloads
1,380 views

We describe best practices for providing convenient, high-speed, secure access to large data via research data portals. We capture these best practices in a new design pattern, the Modern Research Data Portal, that disaggregates the traditional monolithic web-based...

["Computer Networks and Communications","Data Science","Distributed and Parallel Computing","Security and Privacy","World Wide Web and Web Science"]
doi:10.7287/peerj.preprints.3194v2
286 downloads
359 views

Transferring a huge amount of data between different network locations over the network links depends on the heterogeneous wireless network. Such a network consists of several networks with different access technologies. Traditionally, a mobile device may be moved...

["Computer Networks and Communications","Mobile and Ubiquitous Computing","Network Science and Online Social Networks"]
doi:10.7287/peerj.preprints.2970v1
488 downloads
1,982 views

The timely publication of scientific results is essential for dynamic advances in science. The ubiquitous availability of computers which are connected to a global network made the rapid and low-cost distribution of information through electronic channels possible....

["Human-Computer Interaction","Computer Education","Computer Networks and Communications","Digital Libraries","World Wide Web and Web Science"]
doi:10.7287/peerj.preprints.2648v2
377 downloads
1,399 views

"Publication forms the core structure supporting the development and transmission of scientific knowledge" (Galbraith2015). Yet, with the WorldWideWeb a dominant part of current scientific publication and information-dissemination, internet "publication" is still...

["Adaptive and Self-Organizing Systems","Computer Education","Computer Networks and Communications","Digital Libraries","World Wide Web and Web Science"]
doi:10.7287/peerj.preprints.1568v13
What is a PeerJ Preprint?

A PeerJ Preprint is a draft of an article, abstract, or poster that has not yet been peer-reviewed for formal publication. Submit a draft, incomplete, or final version of your work for free.

Submissions today can be approved by Editorial Staff and online in 24 hours.

Establish precedent. Solicit feedback. Publish updates.

Refine by manuscript type

Top subject areas - Preprints

Top subject areas - People

View all subject areas