Preprints (not yet peer-reviewed)

52 downloads
103 views

According to predictions bases on a climate-driven large-scale model the areas surrounding Lake Léman and, to some extent, the Swiss Plateau are suitable for the spread of Ae. albopictus North of the Alps, while other areas in Switzerland (e.g., the city of Zürich)...

["Computer Networks and Communications","Data Science","Spatial and Geographic Information Systems"]
doi:10.7287/peerj.preprints.27251v1
91 downloads
124 views

The Internet of Things is a telecommunication phenomenon which has been introduced during these years, wherein every physical thing would be equipped with electronic parts such as transceivers, sensors, Microcontrollers, RFID, actuators, and proper procedures that...

["Computer Networks and Communications","Real-Time and Embedded Systems"]
doi:10.7287/peerj.preprints.27087v1
278 downloads
392 views

Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet...

["Computer Networks and Communications","Embedded Computing","Emerging Technologies","Security and Privacy"]
doi:10.7287/peerj.preprints.26473v2
130 downloads
247 views

Mobile Cloud Computing (MCC) is a recent technological development, which has emerged from two popular technology trends; mobile computing and cloud. In essence it revolutionises the capabilities of mobile devices by integrating both storage and processing of the...

["Computer Networks and Communications","Distributed and Parallel Computing","Mobile and Ubiquitous Computing"]
doi:10.7287/peerj.preprints.27050v1
1,252 downloads
401 views

This survey focuses on authentication methods for the Internet of Things (IoT). There are many different authentication methods that are used in the IT industry but not all of these can be adapted for the IoT. Lightweight and mutual authentication methods will...

["Computer Networks and Communications","Cryptography","Embedded Computing","Security and Privacy"]
doi:10.7287/peerj.preprints.26474v2
423 downloads
478 views

Advanced Persistent Threat (APT) is one of the most serious types of cyber attacks, which is a new and more complex version of multi-step attack. Within the APT life cycle, the most common technique used to get the point of entry is spear-phishing emails which...

["Computer Networks and Communications","Security and Privacy"]
doi:10.7287/peerj.preprints.2998v2
1,436 downloads
2,674 views

As open access to publications continues to gather momentum we should continuously question whether it is moving in the right direction. A novel intervention in this space is the creation of open access publishing platforms commissioned by funding organisations....

["Computer Networks and Communications","Social Computing"]
doi:10.7287/peerj.preprints.26954v1
1,754 downloads
934 views

A problem facing healthcare record systems throughout the world is how to share the medical data with more stakeholders for various purposes without sacrificing data privacy and integrity. Blockchain, operating in a state of consensus, is the underpinning technology...

["Computer Networks and Communications","Cryptography","Data Science","Security and Privacy"]
doi:10.7287/peerj.preprints.26942v1
151 downloads
346 views

Web traffic is highly jittery and unpredictable. Load balancer plays a significant role in mitigating the uncertainty in web environments. With the growing adoption of cloud computing infrastructure, software load balancer becomes more common in recent years. Current...

["Computer Networks and Communications","Distributed and Parallel Computing","Network Science and Online Social Networks","World Wide Web and Web Science","Software Engineering"]
doi:10.7287/peerj.preprints.26875v1
305 downloads
403 views

In modern as well as ancient ciphers of public key cryptography, substitution boxes find a permanent seat. Generation and cryptanalysis of 4-bit as well as 8-bit crypto S-boxes is of utmost importance in modern cryptography. In this paper, a detailed review of...

["Computer Networks and Communications","Cryptography"]
doi:10.7287/peerj.preprints.26452v1
245 downloads
210 views

4-bit Linear Relations play an important role in Cryptanalysis of 4-bit Bijective Crypto S-boxes. 4-bit finite differences also a major part of cryptanalysis of 4-bit substitution boxes. Count of existence of all 4-bit linear relations, for all of 16 input and...

["Computer Networks and Communications","Cryptography"]
doi:10.7287/peerj.preprints.3441v1
164 downloads
453 views

Password authentication is an essential and widespread form of user authentication on the Internet with no other authentication system matching its dominance. When a password on one website is breached, if reused, the stolen password can be used to gain access...

["Computer Networks and Communications","Security and Privacy"]
doi:10.7287/peerj.preprints.3322v1
369 downloads
1,452 views

We describe best practices for providing convenient, high-speed, secure access to large data via research data portals. We capture these best practices in a new design pattern, the Modern Research Data Portal, that disaggregates the traditional monolithic web-based...

["Computer Networks and Communications","Data Science","Distributed and Parallel Computing","Security and Privacy","World Wide Web and Web Science"]
doi:10.7287/peerj.preprints.3194v2
347 downloads
411 views

Transferring a huge amount of data between different network locations over the network links depends on the heterogeneous wireless network. Such a network consists of several networks with different access technologies. Traditionally, a mobile device may be moved...

["Computer Networks and Communications","Mobile and Ubiquitous Computing","Network Science and Online Social Networks"]
doi:10.7287/peerj.preprints.2970v1
564 downloads
2,085 views

The timely publication of scientific results is essential for dynamic advances in science. The ubiquitous availability of computers which are connected to a global network made the rapid and low-cost distribution of information through electronic channels possible....

["Human-Computer Interaction","Computer Education","Computer Networks and Communications","Digital Libraries","World Wide Web and Web Science"]
doi:10.7287/peerj.preprints.2648v2
What is a PeerJ Preprint?

A PeerJ Preprint is a draft of an article, abstract, or poster that has not yet been peer-reviewed for formal publication. Submit a draft, incomplete, or final version of your work for free.

Submissions today can be approved by Editorial Staff and online in 24 hours.

Establish precedent. Solicit feedback. Publish updates.

Refine by manuscript type

Top subject areas - Preprints

Top subject areas - People

View all subject areas