


default search action
Peer-to-Peer Networking and Applications, Volume 8
Volume 8, Number 1, January 2015
- Aditya Kurve, Christopher Griffin

, David J. Miller, George Kesidis:
Optimizing cluster formation in super-peer networks via local incentive design. 1-21 - Ching-Sheng Wang, Chien-Liang Chen, Der-Jiunn Deng:

P2P-based mobile navigation system with location service. 22-31 - Qing-Chao Cai, Kwok-Tung Lo:

A multi-faced measurement study on a large private BitTorrent community. 32-48 - Jianming Lv, Zhiwen Yu, Tieying Zhang:

Towards an immunity based distributed algorithm to detect harmful files shared in P2P networks. 49-62 - Subhrangsu Mandal

, Sandip Chakraborty, Sushanta Karmakar:
Distributed deterministic 1-2 skip list for peer-to-peer system. 63-86 - Abdulkader Benchi, Pascale Launay, Frédéric Guidec

:
A P2P tuple space implementation for disconnected MANETs. 87-102 - Jian Wang, Xiaoming Hu, Xiaolin Xu, Yinchun Yang:

A verifiable hierarchical circular shift cipher scheme for P2P chunk exchanges. 103-110 - Zhu Ren, Peng Cheng:

Energy management for event capture in rechargeable sensor network with limited capacitor size. 111-119 - Mohammad Shojafar

, Jemal H. Abawajy, Zia Delkhah, Ali Ahmadi, Zahra Pooranian
, Ajith Abraham:
An efficient and distributed file search in unstructured peer-to-peer networks. 120-136 - Chunxi Li, Yishuai Chen, Baoxian Zhang, Cheng Li

, Changjia Chen:
Peer startup process and initial offset placement in peer-to-peer (P2P) live streaming systems. 137-155 - Bingshuang Liu, Tao Wei, Chao Zhang, Jun Li, Jianyu Zhang:

Improving lookup reliability in Kad. 156-170 - Elnaz Mojahedi, Mohammad Abdollahi Azgomi

:
Modeling the propagation of topology-aware P2P worms considering temporal parameters. 171-180
Volume 8, Number 2, March 2015
- Joohee Kim, Maral Mesmakhosroshahi:

Stereo-based region of interest generation for real-time pedestrian detection. 181-188 - Evangelos Pournaras, Martijn Warnier

, Frances M. T. Brazier:
Peer-to-peer aggregation for dynamic adjustments in power demand. 189-202 - Jingyu Wang

, Jianxin Liao, Tonghong Li
, Jing Wang:
On the collaborations of multiple selfish overlays using multi-path resources. 203-215 - Tingting Yang, Chengzhe Lai, Rongxing Lu, Rong Jiang:

EAPSG: Efficient authentication protocol for secure group communications in maritime wideband communication networks. 216-228 - Christof Leng:

Large scale arbitrary search with rendezvous search systems. 229-240 - S.-H. Gary Chan

, Mea Wang, Jacob Chakareski, Bin Wei:
Guest Editorial: Special Issue on P2P Cloud Systems. 241-243 - Jacob Chakareski:

Cost and profit driven cloud-P2P interaction. 244-259 - Konstantinos Deltouzos

, Ilias Gkortsilas, Nikolaos Efthymiopoulos, Spyros G. Denazis:
Liquidstream II - Scalable P2P overlay optimization with adaptive minimal server assistance for stable and efficient video on demand. 260-275 - Eliya Buyukkaya, Maha Abdallah, Gwendal Simon

:
A survey of peer-to-peer overlay approaches for networked virtual environments. 276-300 - Hanna Kavalionak

, Emanuele Carlini
, Laura Ricci
, Alberto Montresor
, Massimo Coppola:
Integrating peer-to-peer and cloud computing for massively multiuser online games. 301-319 - Jian Zhao, Chuan Wu, Xiaojun Lin:

Locality-aware streaming in hybrid P2P-cloud CDN systems. 320-335
Volume 8, Number 3, May 2015
- Fangai Liu, Tianlai Li, Changming Xing:

A hierarchical HRRP(k) network and its application. 337-351 - Ofer Hermoni, Niv Gilboa

, Eyal Felstaine, Shlomi Dolev
:
Rendezvous tunnel for anonymous publishing. 352-366 - Shihabur Rahman Chowdhury

, Arup Raton Roy, Maheen Shaikh, Khuzaima Daudjee:
A taxonomy of decentralized online social networks. 367-383 - Odysseas Papapetrou

, Wolf Siberski, Stefan Siersdorfer:
Efficient model sharing for scalable collaborative classification. 384-398 - Jiayi Liu, Shakeel Ahmad, Eliya Buyukkaya, Raouf Hamzaoui, Gwendal Simon

:
Resource allocation in underprovisioned multioverlay peer-to-peer live video sharing services. 399-413 - Jun-Li Kuo, Chen-Hua Shih, Cheng-Yuan Ho, Yaw-Chung Chen:

Advanced bootstrap and adjusted bandwidth for content distribution in peer-to-peer live streaming. 414-431 - Qiang Li, Tao Qin, Xiaohong Guan, Qinghua Zheng:

Analysis of user's behavior and resource characteristics for private trackers. 432-446 - Spiridoula V. Margariti

, Vassilios V. Dimakopoulos:
On probabilistic flooding search over unstructured peer-to-peer networks. 447-458 - Ke Xu, Xin Liu, Zhen Ma, Yifeng Zhong, Wenlong Chen:

Exploring the policy selection of the P2P VoD system: A simulation-based research. 459-473 - Dan Huang, Min Zhang, Yi Zheng, Changjia Chen, Yan Huang:

Pre-allocation based flash crowd mitigation algorithm for large-scale content delivery system. 493-500 - Xin Cong, Kai Shuang, Sen Su, Fangchun Yang, Lingling Zi:

SBDP: Bandwidth prediction mechanism towards server demands in P2P-VoD system. 501-511 - Tarciana Silva, Carlos Kamienski

, Stenio Fernandes, Djamel Fawzi Hadj Sadok:
A flexible DHT-based directory service for information management. 512-531 - Huanlin Liu, Gao-xiang Chen, Yong Chen, Qian-Bin Chen

:
A trust-based P2P resource search method integrating with Q-learning for future Internet. 532-542 - Fraser Cadger, Kevin Curran

, Jose A. Santos
, Sandra Moffett
:
Towards a location and mobility-aware routing protocol for improving multimedia streaming performance in MANETs. 543-554
Volume 8, Number 4, July 2015
- Jungsoo Han:

Distributed hybrid P2P networking systems. 555-556 - Seokhoon Kim

:
QoS-aware data forwarding architecture for multimedia streaming services in hybrid peer-to-peer networks. 557-566 - Hangki Joh, Intae Ryoo:

A hybrid Wi-Fi P2P with bluetooth low energy for optimizing smart device's communication property. 567-577 - Seung-Bo Park, Kyungyong Chung:

Annotation alignment method on P2P-TV system. 578-586 - Si-Jung Kim, Bong-Han Kim:

Key exchange process of PIM-SM-based for Multiple Group Communication in P2P. 587-595 - Seok-Jae Moon, Chang-Pyo Yoon:

Information retrieval system using the keyword concept net of the P2P service-based in the mobile cloud environment. 596-609 - Kapsu Kim, Myunghui Hong, Kyungyong Chung, Sang-Yeob Oh:

Estimating unreliable objects and system reliability in P2P networks. 610-619 - Yong-Ho Kim, Jae Hoon Sun:

Extracting real IP address used to connect to P2P messenger using ARIT agent. 620-630 - SungHyun Yun, Heuiseok Lim, Kyungyong Chung:

The biometric signature delegation scheme to balance the load of digital signing in hybrid P2P networks. 631-640 - Editor's Note: Special issue on advanced P2P security and privacy. 641

- Ming He, Zhenghu Gong, Lin Chen, Hong Wang, Fan Dai, Zhihong Liu:

Securing network coding against pollution attacks in P2P converged ubiquitous networks. 642-650 - Dan Zhao, Chunqing Wu, Xiaofeng Hu, Hongjun Liu:

LSC2: An extended link state protocol with centralized control. 651-663 - Cándido Caballero-Gil, Pino Caballero-Gil

, Jezabel Molina-Gil:
Merging sub-networks in VANETs by using the IEEE 802.11xx protocols. 664-673 - Soobok Shin, Hongjin Yeh, Kangseok Kim:

An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks. 674-683 - Gunhee Lee

, Wonil Kim, Kangseok Kim, Sangyoon Oh, Dong-Kyoo Kim:
An approach to mitigate DoS attack based on routing misbehavior in wireless ad hoc networks. 684-693 - Jung-Taek Seo

, Seokjun Lee, Taeshik Shon:
A study on memory dump analysis based on digital forensic tools. 694-703 - Jongsu Park, Yong-Surk Lee:

Network processor architecture with flow-based dynamic bandwidth control for efficient QoS provisioning. 704-715 - Kitae Jeong, HyungChul Kang, Changhoon Lee

, Jaechul Sung
, Seokhie Hong, Jongin Lim:
Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis. 716-732
Volume 8, Number 5, September 2015
- Sanmin Liu, Zhixin Sun:

Active learning for P2P traffic identification. 733-740 - Khedija Arour, Taoufik Yeferny:

Learning model for efficient query routing in P2P information retrieval systems. 741-757 - Rui Santos Cruz, Mário Serafim Nunes

:
A P2P streaming architecture supporting scalable media. 758-776 - Le Chen, Rongxing Lu, Zhenfu Cao

, Khalid Nawaf Alharbi, Xiaodong Lin:
MuDA: Multifunctional data aggregation in privacy-preserving smart grid communications. 777-792 - Bojan Marinkovic

, Vincenzo Ciancaglini, Zoran Ognjanovic, Paola Glavan, Luigi Liquori
, Petar Maksimovic
:
Analyzing the exhaustiveness of the Synapse protocol. 793-806 - Adán G. Medrano-Chávez, Elizabeth Pérez Cortés, Miguel López-Guerrero:

A performance comparison of Chord and Kademlia DHTs in high churn scenarios. 807-821 - Bo Zhang

, S.-H. Gary Chan
, Gene Cheung:
Peer-to-peer error recovery for wireless video broadcasting. 822-834 - Sang-Soo Yeo

, Yu Chen, Cho-Li Wang:
Cloud, grid, P2P and internet computing: Recent trends and future directions. 835-837 - Hilal Jan, Anand Paul

, Abid Ali Minhas
, Awais Ahmad, Sohail Jabbar
, Mucheol Kim:
Dependability and reliability analysis of intra cluster routing technique. 838-850 - Chun-Wei Lin

, Wensheng Gan
, Tzung-Pei Hong
, Sang Oh Park, Bo-Wei Chen:
Peer-to-peer usage analysis in dynamic databases. 851-862 - Seungmin Rho, Hangbae Chang, Sanggeun Kim, Yang Sun Lee

:
An efficient peer-to-peer and distributed scheduling for cloud and grid computing. 863-871 - Jonghan Lee, Kyumin Cho, ChangYong Lee, Seungjoo Kim

:
VoIP-aware network attack detection based on statistics and behavior of SIP traffic. 872-880 - Wenbo Shi, Neeraj Kumar

, Peng Gong, Naveen K. Chilamkurti, Hangbae Chang:
On the security of a certificateless online/offline signcryption for Internet of Things. 881-885 - Kyuhwan Lee, JungYul Choi, JoongSoo Ma:

Performance evaluation for delay time estimation in IEEE 802.16m sleep mode. 886-895 - Amol Jaikar, Seo-Young Noh:

Cost and performance effective data center selection system for scientific federated cloud. 896-902 - Hang Tu, Neeraj Kumar

, Naveen K. Chilamkurti, Seungmin Rho:
An improved authentication protocol for session initiation protocol using smart card. 903-910 - Muhammad Yasin, Junaid Ahmad Qureshi, Firdous Kausar

, Jongsung Kim, Jungtaek Seo
:
A granular approach for user-centric network analysis to identify digital evidence. 911-924
Volume 8, Number 6, November 2015
- Hua Li, Bin Hu, Cailian Chen, Xinping Guan, Cunqing Hua:

Relay selection for peer-to-peer cooperative OFDMA with channel distribution uncertainty. 925-937 - Huseyin Guler, Berkant Barla Cambazoglu, Öznur Özkasap

:
Task allocation in volunteer computing networks under monetary budget constraints. 938-951 - Wenlong Chen, Yubao Liu, Haiyang Wang:

On storage partitioning of internet routing tables: A P2P-based enhancement for scalable routers. 952-964 - Sahar Mohamed Ghanem, Mohamed A. Ismail, Samia G. Omar:

VITAL: Structured and clustered super-peer network for similarity search. 965-991 - Zhi Yang, Yuanjian Xing, Chi Chen, Jilong Xue, Yafei Dai:

Understanding the performance of offline download in real p2p networks. 992-1007 - Ahmad Jafarabadi, Mohammad Abdollahi Azgomi

:
A stochastic epidemiological model for the propagation of active worms considering the dynamicity of network topology. 1008-1022 - Hongwei Li, Haojin Zhu

, Bong Jun Choi
:
Guest editorial: Security and privacy of P2P networks in emerging smart city. 1023-1024 - Jinbo Xiong, Fenghua Li, Jianfeng Ma, Ximeng Liu

, Zhiqiang Yao, Patrick S. Chen:
A full lifecycle privacy protection scheme for sensitive data in cloud computing. 1025-1037 - Hai-Jiang Xie, Jizhong Zhao:

A lightweight identity authentication method by exploiting network covert channel. 1038-1047 - Qiyi Han, Hong Wen, Mengyin Ren, Bin Wu, Shengqiang Li:

A topological potential weighted community-based recommendation trust model for P2P networks. 1048-1058 - Haomiao Yang, Hyunsung Kim

, Kambombo Mtonga
:
An efficient privacy-preserving authentication scheme with adaptive key evolution in remote health monitoring system. 1059-1069 - Qi Jiang

, Jianfeng Ma, Xiang Lu, Youliang Tian:
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. 1070-1081 - Mi Wen, Jingsheng Lei, Zhongqin Bi, Jing Li:

EAPA: An efficient authentication protocol against pollution attack for smart grid. 1082-1089 - Xiaomei Zhang, Xiaolei Dong, Naixue Xiong, Jie Wu, Xiuqi Li:

Fault-aware flow control and multi-path routing in VANETs. 1090-1107 - Yipin Sun, Bofeng Zhang, Baokang Zhao, Xiangyu Su, Jinshu Su

:
Mix-zones optimal deployment for protecting location privacy in VANET. 1108-1121 - Le Chen, Rongxing Lu, Zhenfu Cao

:
PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications. 1122-1132 - Jun Wu, Mianxiong Dong

, Kaoru Ota
, Lin Liang, Zhenyu Zhou:
Securing distributed storage for Social Internet of Things using regenerating code and Blom key agreement. 1133-1142

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














