Efficient Any Source Overlay Multicast In CRT-Based P2P Networks-A Capacity-Constrained Approach
In this work, we have considered designing a highly efficient capacity-constrained overlay
multicast protocol; it is designed specifically for an existing Chinese Remainder Theorem …
multicast protocol; it is designed specifically for an existing Chinese Remainder Theorem …
Emergence of blockchain technology in the healthcare and insurance industries
N Rahimi, SSV Gudapati - Blockchain Technology Solutions for the Security …, 2023 - Elsevier
Innovation in healthcare sector has resulted in a disparity of opinions among clients. A report
by HealthTech Magazine indicated that there were nearly 32 million breaches of health …
by HealthTech Magazine indicated that there were nearly 32 million breaches of health …
[PDF][PDF] Adversarial Machine Learning: Difficulties in Applying Machine Learning to Existing Cybersecurity Systems.
N Rahimi, J Maynor, B Gupta - CATA, 2020 - easychair.org
Abstract Machine learning is an attractive tool to make use of in various areas of computer
science. It allows us to take a hands-off approach in various situations where previously …
science. It allows us to take a hands-off approach in various situations where previously …
[PDF][PDF] Generalization of rc-based low diameter hierarchical structured p2p network architecture
In this work, we have considered generalizing a non-DHT-based low diameter hierarchical
structured P2P network which is designed applying modular arithmetic, called the Residue …
structured P2P network which is designed applying modular arithmetic, called the Residue …
Secure and Efficient Hierarchical P2P Fog Architecture: A Novel Approach for IoT
In recent years, the rapid growth of IoT devices has posed challenges for traditional cloud
computing architectures due to issues related to latency, bandwidth, and real-time response …
computing architectures due to issues related to latency, bandwidth, and real-time response …
Efficient data lookup in non-DHT based low diameter structured P2P network
In this paper, we have considered a recently reported non-DHT based structured P2P
system. The architecture is based on Linear Diophantine Equation (LDE) and it is an interest …
system. The architecture is based on Linear Diophantine Equation (LDE) and it is an interest …
Security consideration in peer-to-peer networks with a case study application
N Rahimi - International Journal of Network Security & Its …, 2020 - papers.ssrn.com
Abstract Peer-to-Peer (P2P) overlay networks wide adoption has also created vast dangers
due to the millions of users who are not conversant with the potential security risks. Lack of …
due to the millions of users who are not conversant with the potential security risks. Lack of …
[HTML][HTML] Android security and its rooting—a possible improvement of its security architecture
N Rahimi, J Nolen, B Gupta - Journal of Information Security, 2019 - scirp.org
The advent of technology brought forth a myriad of developments that have streamlined the
manner through which people operate. With the growing need to be at the forefront of …
manner through which people operate. With the growing need to be at the forefront of …
Design of Very Efficient Lookup Algorithms for a Low Diameter Hierarchical Structured Peer-to-Peer Network
B Gupta, N Rahimi, H Hexmoor… - 2018 IEEE 16th …, 2018 - ieeexplore.ieee.org
In this work, we have considered a new hierarchical non-DHT based architecture for Peer-to-
Peer (P2P) networks in which at each level of the hierarchy existing networks are all …
Peer (P2P) networks in which at each level of the hierarchy existing networks are all …
[PDF][PDF] A Study of the Landscape of Internet Censorship and Anti-Censorship in Middle East.
N Rahimi, B Gupta - CATA, 2020 - easychair.org
The power of technology is one which supersedes any other tool of communication ever
formulated and implemented by human beings. The internet has been long cited by scholars …
formulated and implemented by human beings. The internet has been long cited by scholars …