Efficient Any Source Overlay Multicast In CRT-Based P2P Networks-A Capacity-Constrained Approach

I Roy, K Maddali, S Kaluvakuri… - 2019 IEEE 17th …, 2019 - ieeexplore.ieee.org
In this work, we have considered designing a highly efficient capacity-constrained overlay
multicast protocol; it is designed specifically for an existing Chinese Remainder Theorem …

Emergence of blockchain technology in the healthcare and insurance industries

N Rahimi, SSV Gudapati - Blockchain Technology Solutions for the Security …, 2023 - Elsevier
Innovation in healthcare sector has resulted in a disparity of opinions among clients. A report
by HealthTech Magazine indicated that there were nearly 32 million breaches of health …

[PDF][PDF] Adversarial Machine Learning: Difficulties in Applying Machine Learning to Existing Cybersecurity Systems.

N Rahimi, J Maynor, B Gupta - CATA, 2020 - easychair.org
Abstract Machine learning is an attractive tool to make use of in various areas of computer
science. It allows us to take a hands-off approach in various situations where previously …

[PDF][PDF] Generalization of rc-based low diameter hierarchical structured p2p network architecture

S Kaluvakuri, K Maddali, N Rahimi, B Gupta… - International Journal of …, 2020 - isca-hq.org
In this work, we have considered generalizing a non-DHT-based low diameter hierarchical
structured P2P network which is designed applying modular arithmetic, called the Residue …

Secure and Efficient Hierarchical P2P Fog Architecture: A Novel Approach for IoT

SA Murad, N Rahimi - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
In recent years, the rapid growth of IoT devices has posed challenges for traditional cloud
computing architectures due to issues related to latency, bandwidth, and real-time response …

Efficient data lookup in non-DHT based low diameter structured P2P network

B Gupta, N Rahimi, S Rahimi… - 2017 IEEE 15th …, 2017 - ieeexplore.ieee.org
In this paper, we have considered a recently reported non-DHT based structured P2P
system. The architecture is based on Linear Diophantine Equation (LDE) and it is an interest …

Security consideration in peer-to-peer networks with a case study application

N Rahimi - International Journal of Network Security & Its …, 2020 - papers.ssrn.com
Abstract Peer-to-Peer (P2P) overlay networks wide adoption has also created vast dangers
due to the millions of users who are not conversant with the potential security risks. Lack of …

[HTML][HTML] Android security and its rooting—a possible improvement of its security architecture

N Rahimi, J Nolen, B Gupta - Journal of Information Security, 2019 - scirp.org
The advent of technology brought forth a myriad of developments that have streamlined the
manner through which people operate. With the growing need to be at the forefront of …

Design of Very Efficient Lookup Algorithms for a Low Diameter Hierarchical Structured Peer-to-Peer Network

B Gupta, N Rahimi, H Hexmoor… - 2018 IEEE 16th …, 2018 - ieeexplore.ieee.org
In this work, we have considered a new hierarchical non-DHT based architecture for Peer-to-
Peer (P2P) networks in which at each level of the hierarchy existing networks are all …

[PDF][PDF] A Study of the Landscape of Internet Censorship and Anti-Censorship in Middle East.

N Rahimi, B Gupta - CATA, 2020 - easychair.org
The power of technology is one which supersedes any other tool of communication ever
formulated and implemented by human beings. The internet has been long cited by scholars …