You are currently viewing a new version of our website. To view the old version click .

Future Internet, Volume 12, Issue 8

August 2020 - 18 articles

Cover Story: Named data networking (NDN), where addressable content name is used, is considered a candidate of next-generation internet architectures. NDN routers use in-network cache to replicate and store passing packets to make a faster content delivery. Because NDN uses a human-readable name, it is easy for an adversary to guess what kind of content is requested. To solve this issue, we developed a PEKS-based strategy for forwarding packets, where PEKS stands for public key encryption with keyword search. We implemented the PEKS-based strategy based on the best route strategy and multicast strategy of NDN and showed the performance of the PEKS-based NDN strategy. Our proposed PEKS-based NDN strategy provides higher privacy preservation, there is no master secret key which can be used to derive private keys, and PEKS_based NDN still allows in-network caching. View this paper.
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (18)

  • Article
  • Open Access
5 Citations
3,909 Views
15 Pages

18 August 2020

This paper examines dynamic identity, as it pertains to the Internet of Things (IoT), and explores the practical implementation of a mitigation technique for some of the key weaknesses of a conventional dynamic identity model. This paper explores hum...

  • Article
  • Open Access
1 Citations
3,131 Views
12 Pages

18 August 2020

We study the problem of color-avoiding and color-favored percolation in a network, i.e., the problem of finding a path that avoids a certain number of colors, associated with vulnerabilities of nodes or links, or is attracted by them. We investigate...

  • Article
  • Open Access
2 Citations
3,910 Views
15 Pages

Progressive Teaching Improvement For Small Scale Learning: A Case Study in China

  • Bo Jiang,
  • Yanbai He,
  • Rui Chen,
  • Chuanyan Hao,
  • Sijiang Liu and
  • Gangyao Zhang

17 August 2020

Learning data feedback and analysis have been widely investigated in all aspects of education, especially for large scale remote learning scenario like Massive Open Online Courses (MOOCs) data analysis. On-site teaching and learning still remains the...

  • Article
  • Open Access
14 Citations
5,616 Views
13 Pages

12 August 2020

Aims: In the last decade, the use of smartphones, computers and devices has progressively increased, and prolonged use of technology and the internet has generated new arenas (and tools) for victimization. The first aim of this study was to analyze t...

  • Article
  • Open Access
14 Citations
11,403 Views
16 Pages

Consortium Blockchain Smart Contracts for Musical Rights Governance in a Collective Management Organizations (CMOs) Use Case

  • Nikolaos Kapsoulis,
  • Alexandros Psychas,
  • Georgios Palaiokrassas,
  • Achilleas Marinakis,
  • Antonios Litke,
  • Theodora Varvarigou,
  • Charalampos Bouchlis,
  • Amaryllis Raouzaiou,
  • Gonçal Calvo and
  • Jordi Escudero Subirana

11 August 2020

Private and permissioned blockchains are conceptualized and mostly assembled for fulfilling corporations’ demands and needs in the context of their own premises. This paper presents a complete and sophisticated end-to-end permissioned blockchai...

  • Article
  • Open Access
35 Citations
7,321 Views
17 Pages

11 August 2020

High performance computing (HPC) is widely recognized as a key enabling technology for advancing scientific progress, industrial competitiveness, national and regional security, and the quality of human life. Notwithstanding this contribution, the la...

  • Article
  • Open Access
2 Citations
3,785 Views
17 Pages

How Reputation Systems Change the Psychological Antecedents of Fairness in Virtual Environments

  • Stefania Collodi,
  • Maria Fiorenza,
  • Andrea Guazzini and
  • Mirko Duradoni

9 August 2020

Reputational systems promote pro-social behaviors, also in virtual environments, therefore their study contributes to the knowledge of social interactions. Literature findings emphasize the power of reputation in fostering fairness in many circumstan...

  • Article
  • Open Access
12 Citations
4,267 Views
13 Pages

9 August 2020

Deep learning (DL) models have emerged in recent years as the state-of-the-art technique across numerous machine learning application domains. In particular, image processing-related tasks have seen a significant improvement in terms of performance d...

  • Article
  • Open Access
8 Citations
7,906 Views
15 Pages

6 August 2020

As English is a global language, it is important for students to learn it effectively and efficiently. Learning English from English cram schools is very popular in Taiwan. Most students have studied in English cram schools for some period of time of...

  • Article
  • Open Access
13 Citations
4,914 Views
22 Pages

A PEKS-Based NDN Strategy for Name Privacy

  • Kyi Thar Ko,
  • Htet Htet Hlaing and
  • Masahiro Mambo

Named Data Networking (NDN), where addressable content name is used, is considered as a candidate of next-generation Internet architectures. NDN routers use In-Network cache to replicate and store passing packets to make faster content delivery. Beca...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903