


default search action
Peer-to-Peer Networking and Applications, Volume 8
Volume 8, Number 1, January 2015
- Aditya Kurve, Christopher Griffin
, David J. Miller, George Kesidis:
Optimizing cluster formation in super-peer networks via local incentive design. 1-21 - Ching-Sheng Wang, Chien-Liang Chen, Der-Jiunn Deng:
P2P-based mobile navigation system with location service. 22-31 - Qing-Chao Cai, Kwok-Tung Lo:
A multi-faced measurement study on a large private BitTorrent community. 32-48 - Jianming Lv, Zhiwen Yu, Tieying Zhang:
Towards an immunity based distributed algorithm to detect harmful files shared in P2P networks. 49-62 - Subhrangsu Mandal, Sandip Chakraborty, Sushanta Karmakar:
Distributed deterministic 1-2 skip list for peer-to-peer system. 63-86 - Abdulkader Benchi, Pascale Launay, Frédéric Guidec
:
A P2P tuple space implementation for disconnected MANETs. 87-102 - Jian Wang, Xiaoming Hu, Xiaolin Xu, Yinchun Yang:
A verifiable hierarchical circular shift cipher scheme for P2P chunk exchanges. 103-110 - Zhu Ren, Peng Cheng:
Energy management for event capture in rechargeable sensor network with limited capacitor size. 111-119 - Mohammad Shojafar
, Jemal H. Abawajy, Zia Delkhah, Ali Ahmadi, Zahra Pooranian
, Ajith Abraham:
An efficient and distributed file search in unstructured peer-to-peer networks. 120-136 - Chunxi Li, Yishuai Chen, Baoxian Zhang, Cheng Li
, Changjia Chen:
Peer startup process and initial offset placement in peer-to-peer (P2P) live streaming systems. 137-155 - Bingshuang Liu, Tao Wei, Chao Zhang, Jun Li, Jianyu Zhang:
Improving lookup reliability in Kad. 156-170 - Elnaz Mojahedi, Mohammad Abdollahi Azgomi
:
Modeling the propagation of topology-aware P2P worms considering temporal parameters. 171-180
Volume 8, Number 2, March 2015
- Joohee Kim, Maral Mesmakhosroshahi:
Stereo-based region of interest generation for real-time pedestrian detection. 181-188 - Evangelos Pournaras, Martijn Warnier
, Frances M. T. Brazier:
Peer-to-peer aggregation for dynamic adjustments in power demand. 189-202 - Jingyu Wang
, Jianxin Liao, Tonghong Li
, Jing Wang:
On the collaborations of multiple selfish overlays using multi-path resources. 203-215 - Tingting Yang, Chengzhe Lai, Rongxing Lu, Rong Jiang:
EAPSG: Efficient authentication protocol for secure group communications in maritime wideband communication networks. 216-228 - Christof Leng:
Large scale arbitrary search with rendezvous search systems. 229-240 - S.-H. Gary Chan
, Mea Wang, Jacob Chakareski, Bin Wei:
Guest Editorial: Special Issue on P2P Cloud Systems. 241-243 - Jacob Chakareski:
Cost and profit driven cloud-P2P interaction. 244-259 - Konstantinos Deltouzos
, Ilias Gkortsilas, Nikolaos Efthymiopoulos, Spyros G. Denazis:
Liquidstream II - Scalable P2P overlay optimization with adaptive minimal server assistance for stable and efficient video on demand. 260-275 - Eliya Buyukkaya, Maha Abdallah, Gwendal Simon
:
A survey of peer-to-peer overlay approaches for networked virtual environments. 276-300 - Hanna Kavalionak, Emanuele Carlini
, Laura Ricci
, Alberto Montresor
, Massimo Coppola:
Integrating peer-to-peer and cloud computing for massively multiuser online games. 301-319 - Jian Zhao, Chuan Wu, Xiaojun Lin:
Locality-aware streaming in hybrid P2P-cloud CDN systems. 320-335
Volume 8, Number 3, May 2015
- Fangai Liu, Tianlai Li, Changming Xing:
A hierarchical HRRP(k) network and its application. 337-351 - Ofer Hermoni, Niv Gilboa
, Eyal Felstaine, Shlomi Dolev
:
Rendezvous tunnel for anonymous publishing. 352-366 - Shihabur Rahman Chowdhury
, Arup Raton Roy, Maheen Shaikh, Khuzaima Daudjee:
A taxonomy of decentralized online social networks. 367-383 - Odysseas Papapetrou
, Wolf Siberski, Stefan Siersdorfer:
Efficient model sharing for scalable collaborative classification. 384-398 - Jiayi Liu, Shakeel Ahmad, Eliya Buyukkaya, Raouf Hamzaoui, Gwendal Simon
:
Resource allocation in underprovisioned multioverlay peer-to-peer live video sharing services. 399-413 - Jun-Li Kuo, Chen-Hua Shih, Cheng-Yuan Ho, Yaw-Chung Chen:
Advanced bootstrap and adjusted bandwidth for content distribution in peer-to-peer live streaming. 414-431 - Qiang Li, Tao Qin, Xiaohong Guan, Qinghua Zheng:
Analysis of user's behavior and resource characteristics for private trackers. 432-446 - Spiridoula V. Margariti
, Vassilios V. Dimakopoulos:
On probabilistic flooding search over unstructured peer-to-peer networks. 447-458 - Ke Xu, Xin Liu, Zhen Ma, Yifeng Zhong, Wenlong Chen:
Exploring the policy selection of the P2P VoD system: A simulation-based research. 459-473 - Dan Huang, Min Zhang, Yi Zheng, Changjia Chen, Yan Huang:
Pre-allocation based flash crowd mitigation algorithm for large-scale content delivery system. 493-500 - Xin Cong, Kai Shuang, Sen Su, Fangchun Yang, Lingling Zi:
SBDP: Bandwidth prediction mechanism towards server demands in P2P-VoD system. 501-511 - Tarciana Silva, Carlos Kamienski
, Stenio Fernandes, Djamel Fawzi Hadj Sadok:
A flexible DHT-based directory service for information management. 512-531 - Huanlin Liu, Gao-xiang Chen, Yong Chen, Qian-Bin Chen
:
A trust-based P2P resource search method integrating with Q-learning for future Internet. 532-542 - Fraser Cadger, Kevin Curran
, Jose A. Santos
, Sandra Moffett
:
Towards a location and mobility-aware routing protocol for improving multimedia streaming performance in MANETs. 543-554
Volume 8, Number 4, July 2015
- Jungsoo Han:
Distributed hybrid P2P networking systems. 555-556 - Seokhoon Kim
:
QoS-aware data forwarding architecture for multimedia streaming services in hybrid peer-to-peer networks. 557-566 - Hangki Joh, Intae Ryoo:
A hybrid Wi-Fi P2P with bluetooth low energy for optimizing smart device's communication property. 567-577 - Seung-Bo Park, Kyungyong Chung:
Annotation alignment method on P2P-TV system. 578-586 - Si-Jung Kim, Bong-Han Kim:
Key exchange process of PIM-SM-based for Multiple Group Communication in P2P. 587-595 - Seok-Jae Moon, Chang-Pyo Yoon:
Information retrieval system using the keyword concept net of the P2P service-based in the mobile cloud environment. 596-609 - Kapsu Kim, Myunghui Hong, Kyungyong Chung, Sang-Yeob Oh:
Estimating unreliable objects and system reliability in P2P networks. 610-619 - Yong-Ho Kim, Jae Hoon Sun:
Extracting real IP address used to connect to P2P messenger using ARIT agent. 620-630 - SungHyun Yun, Heuiseok Lim, Kyungyong Chung:
The biometric signature delegation scheme to balance the load of digital signing in hybrid P2P networks. 631-640 - Editor's Note: Special issue on advanced P2P security and privacy. 641
- Ming He, Zhenghu Gong, Lin Chen, Hong Wang, Fan Dai, Zhihong Liu:
Securing network coding against pollution attacks in P2P converged ubiquitous networks. 642-650 - Dan Zhao, Chunqing Wu, Xiaofeng Hu, Hongjun Liu:
LSC2: An extended link state protocol with centralized control. 651-663 - Cándido Caballero-Gil, Pino Caballero-Gil
, Jezabel Molina-Gil:
Merging sub-networks in VANETs by using the IEEE 802.11xx protocols. 664-673 - Soobok Shin, Hongjin Yeh, Kangseok Kim:
An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks. 674-683 - Gunhee Lee
, Wonil Kim, Kangseok Kim, Sangyoon Oh, Dong-Kyoo Kim:
An approach to mitigate DoS attack based on routing misbehavior in wireless ad hoc networks. 684-693 - Jung-Taek Seo
, Seokjun Lee, Taeshik Shon:
A study on memory dump analysis based on digital forensic tools. 694-703 - Jongsu Park, Yong-Surk Lee:
Network processor architecture with flow-based dynamic bandwidth control for efficient QoS provisioning. 704-715 - Kitae Jeong, HyungChul Kang, Changhoon Lee
, Jaechul Sung
, Seokhie Hong, Jongin Lim:
Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis. 716-732
Volume 8, Number 5, September 2015
- Sanmin Liu, Zhixin Sun:
Active learning for P2P traffic identification. 733-740 - Khedija Arour, Taoufik Yeferny:
Learning model for efficient query routing in P2P information retrieval systems. 741-757 - Rui Santos Cruz, Mário Serafim Nunes
:
A P2P streaming architecture supporting scalable media. 758-776 - Le Chen, Rongxing Lu, Zhenfu Cao
, Khalid Nawaf Alharbi, Xiaodong Lin:
MuDA: Multifunctional data aggregation in privacy-preserving smart grid communications. 777-792 - Bojan Marinkovic
, Vincenzo Ciancaglini, Zoran Ognjanovic, Paola Glavan, Luigi Liquori
, Petar Maksimovic
:
Analyzing the exhaustiveness of the Synapse protocol. 793-806 - Adán G. Medrano-Chávez, Elizabeth Pérez Cortés, Miguel López-Guerrero:
A performance comparison of Chord and Kademlia DHTs in high churn scenarios. 807-821 - Bo Zhang
, S.-H. Gary Chan
, Gene Cheung:
Peer-to-peer error recovery for wireless video broadcasting. 822-834 - Sang-Soo Yeo
, Yu Chen, Cho-Li Wang:
Cloud, grid, P2P and internet computing: Recent trends and future directions. 835-837 - Hilal Jan, Anand Paul
, Abid Ali Minhas
, Awais Ahmad, Sohail Jabbar
, Mucheol Kim:
Dependability and reliability analysis of intra cluster routing technique. 838-850 - Chun-Wei Lin
, Wensheng Gan
, Tzung-Pei Hong
, Sang Oh Park, Bo-Wei Chen:
Peer-to-peer usage analysis in dynamic databases. 851-862 - Seungmin Rho, Hangbae Chang, Sanggeun Kim, Yang Sun Lee
:
An efficient peer-to-peer and distributed scheduling for cloud and grid computing. 863-871 - Jonghan Lee, Kyumin Cho, ChangYong Lee, Seungjoo Kim
:
VoIP-aware network attack detection based on statistics and behavior of SIP traffic. 872-880 - Wenbo Shi, Neeraj Kumar
, Peng Gong, Naveen K. Chilamkurti, Hangbae Chang:
On the security of a certificateless online/offline signcryption for Internet of Things. 881-885 - Kyuhwan Lee, JungYul Choi, JoongSoo Ma:
Performance evaluation for delay time estimation in IEEE 802.16m sleep mode. 886-895 - Amol Jaikar, Seo-Young Noh:
Cost and performance effective data center selection system for scientific federated cloud. 896-902 - Hang Tu, Neeraj Kumar
, Naveen K. Chilamkurti, Seungmin Rho:
An improved authentication protocol for session initiation protocol using smart card. 903-910 - Muhammad Yasin, Junaid Ahmad Qureshi, Firdous Kausar
, Jongsung Kim, Jungtaek Seo
:
A granular approach for user-centric network analysis to identify digital evidence. 911-924
Volume 8, Number 6, November 2015
- Hua Li, Bin Hu, Cailian Chen, Xinping Guan, Cunqing Hua:
Relay selection for peer-to-peer cooperative OFDMA with channel distribution uncertainty. 925-937 - Huseyin Guler, Berkant Barla Cambazoglu, Öznur Özkasap
:
Task allocation in volunteer computing networks under monetary budget constraints. 938-951 - Wenlong Chen, Yubao Liu, Haiyang Wang:
On storage partitioning of internet routing tables: A P2P-based enhancement for scalable routers. 952-964 - Sahar Mohamed Ghanem, Mohamed A. Ismail, Samia G. Omar:
VITAL: Structured and clustered super-peer network for similarity search. 965-991 - Zhi Yang, Yuanjian Xing, Chi Chen, Jilong Xue, Yafei Dai:
Understanding the performance of offline download in real p2p networks. 992-1007 - Ahmad Jafarabadi, Mohammad Abdollahi Azgomi
:
A stochastic epidemiological model for the propagation of active worms considering the dynamicity of network topology. 1008-1022 - Hongwei Li, Haojin Zhu
, Bong Jun Choi
:
Guest editorial: Security and privacy of P2P networks in emerging smart city. 1023-1024 - Jinbo Xiong, Fenghua Li, Jianfeng Ma, Ximeng Liu
, Zhiqiang Yao, Patrick S. Chen:
A full lifecycle privacy protection scheme for sensitive data in cloud computing. 1025-1037 - Hai-Jiang Xie, Jizhong Zhao:
A lightweight identity authentication method by exploiting network covert channel. 1038-1047 - Qiyi Han, Hong Wen, Mengyin Ren, Bin Wu, Shengqiang Li:
A topological potential weighted community-based recommendation trust model for P2P networks. 1048-1058 - Haomiao Yang, Hyunsung Kim
, Kambombo Mtonga
:
An efficient privacy-preserving authentication scheme with adaptive key evolution in remote health monitoring system. 1059-1069 - Qi Jiang
, Jianfeng Ma, Xiang Lu, Youliang Tian:
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. 1070-1081 - Mi Wen, Jingsheng Lei, Zhongqin Bi, Jing Li:
EAPA: An efficient authentication protocol against pollution attack for smart grid. 1082-1089 - Xiaomei Zhang, Xiaolei Dong, Naixue Xiong, Jie Wu, Xiuqi Li:
Fault-aware flow control and multi-path routing in VANETs. 1090-1107 - Yipin Sun, Bofeng Zhang, Baokang Zhao, Xiangyu Su, Jinshu Su
:
Mix-zones optimal deployment for protecting location privacy in VANET. 1108-1121 - Le Chen, Rongxing Lu, Zhenfu Cao
:
PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications. 1122-1132 - Jun Wu, Mianxiong Dong
, Kaoru Ota
, Lin Liang, Zhenyu Zhou:
Securing distributed storage for Social Internet of Things using regenerating code and Blom key agreement. 1133-1142

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.