


default search action
Peer-to-Peer Networking and Applications, Volume 9
Volume 9, Number 1, January 2016
- Francisco Henrique, Ana Paula Couto da Silva

, Alex Borges Vieira:
Characterizing peers communities and dynamics in a P2P live streaming system. 1-15 - Yen-Wen Chen, Po-Ying Liao, Ying-Cheng Wang:

A channel-hopping scheme for continuous rendezvous and data delivery in cognitive radio network. 16-27 - Xiaotong Wu

, Meng Liu, Wan-Chun Dou, Longxiang Gao, Shui Yu
:
A scalable and automatic mechanism for resource allocation in self-organizing cloud. 28-41 - Eunhye Kim, Roger P. Karrer, Ju-Won Park

, Sehun Kim:
A novel fairness-aware parallel download scheme. 42-53 - Jehn-Ruey Jiang, Jih-Wei Wu, Chi-Wen Fann, Jie-Yi Wu:

Immersive voice communication for massively multiplayer online games. 54-66 - Jin He

, Mianxiong Dong
, Kaoru Ota
, Minyu Fan, Guangwei Wang:
NetSecCC: A scalable and fault-tolerant architecture for cloud computing security. 67-81 - Mohammad Sabzinejad Farash

:
Security analysis and enhancements of an improved authentication for session initiation protocol with provable security. 82-91 - Ping He, Hong Shen, Yidong Li

:
Tree-based data retrieval algorithm for multi-item request with deadline in wireless networks. 92-107 - Liping Zhang, Shanyu Tang, Shaohui Zhu:

A lightweight privacy preserving authenticated key agreement protocol for SIP-based VoIP. 108-126 - Xianfu Meng, Jing Jin:

A free rider aware topological construction strategy for search in unstructured P2P networks. 127-141 - Yingwu Zhu:

Towards bandwidth-efficient keyword continuous query processing over DHTs. 142-158 - U. Venkanna, R. Leela Velusamy

:
TEA-CBRP: Distributed cluster head election in MANET by using AHP. 159-170 - Dheerendra Mishra

, Ashok Kumar Das, Sourav Mukhopadhyay:
A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card. 171-192 - Harisankar Haridas, Janakiram Dharanipragada:

CAPS: A cloud-assisted approach to handle spikes in peer-to-peer web search. 193-208 - Maria Luisa Merani

, Laura Natali, Cettina Barcellona:
An IP-TV P2P streaming system that improves the viewing quality and confines the startup delay of regular audience. 209-222 - Ashok Kumar Das:

A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. 223-244 - Zhixin Liu, Panpan Wang, Yuanqing Xia, Hongjiu Yang, Xinping Guan:

Chance-constraint optimization of power control in cognitive radio networks. 245-253
Volume 9, Number 2, March 2016
- Xianfu Meng, Dongxu Liu:

A traffic-efficient message forwarding approach in unstructured P2P networks. 255-265 - Yung-Ting Chuang, Peter Michael Melliar-Smith, Louise Elizabeth Moser, Isai Michel Lombera:

Maintaining censorship resistance in the iTrust network for publication, search and retrieval. 266-283 - Yang Zong-chang:

Modeling and forecasting of daily online-user movement in instant messaging based on the elliptic-orbit model: A case study for China. 284-298 - Gi Seok Park, Hwangjun Song:

A novel hybrid P2P and cloud storage system for retrievability and privacy enhancement. 299-312 - Antonio Delgado Peris

, José M. Hernández
, Eduardo Huedo
:
Evaluation of alternatives for the broadcast operation in Kademlia under churn. 313-327 - Vineet Nagrath, Olivier Morel, Aamir Saeed Malik, Mohammed Naufal bin Mohamad Saad

, Fabrice Mériaudeau:
Peer to peer trade in HTM5 meta model for agent oriented cloud robotic systems. 328-343 - Zied Trifa, Maher Khemakhem

:
A novel replication technique to attenuate churn effects. 344-355 - Nadir Shah, Ayaz Ahmad

, Babar Nazir
, Depei Qian:
A cross-layer approach for partition detection at overlay layer for structured P2P in MANETs. 356-371 - Xinxin Liu, Shaohua Tang, Shiqian Chen:

A description logic-based policy compliance checker for trust negotiation. 372-383 - Chong Lou, Weihua Zhuang

:
Energy-efficient routing over coordinated sleep scheduling in wireless ad hoc networks. 384-396 - Daniel Kraft:

Difficulty control for blockchain-based consensus systems. 397-413 - Xiaolong Li, Meiping Peng, Jun Cai, Changyan Yi

, Hong Zhang:
OPNET-based modeling and simulation of mobile Zigbee sensor networks. 414-423 - Tao Qin, Lei Wang, Dan Zhao, Min Zhu:

CUFTI: Methods for core users finding and traffic identification in P2P systems. 424-435 - Minoo Kargar Bideh, Behzad Akbari, Abdollah Ghaffari Sheshjavani

:
Adaptive content-and-deadline aware chunk scheduling in mesh-based P2P video streaming. 436-448 - Yanrong Lu, Lixiang Li

, Haipeng Peng, Yixian Yang:
A secure and efficient mutual authentication scheme for session initiation protocol. 449-459
Volume 9, Number 3, May 2016
- Sun-Moon Jo, Gui-Jung Kim, Jung-Soo Han:

Convergence P2P context awareness. 461-464 - Hyesung Ji, Kinam Park, Jaechoon Jo

, Heuiseok Lim:
Mining students activities from a computer supported collaborative learning system based on peer to peer network. 465-476 - Seokhoon Kim

, Jinweon Suk:
Efficient peer-to-peer context awareness data forwarding scheme in emergency situations. 477-486 - GuoZhong Li, Eun-Mi Park, Seong-Taek Park:

Effects of social media usage on country image and purchase intention from social P2P network perspective. 487-497 - Hyun Mi Jung, Il-Sun Hwang, Jeong-Kyung Moon, Hark-Soo Park:

A security monitoring method for malicious P2P event detection. 498-507 - Cheol-Joo Chae, Yongju Shin, Kiseok Choi, Ki-Bong Kim, Kwang-Nam Choi:

A privacy data leakage prevention method in P2P networks. 508-519 - Hangki Joh, Inhwan Yang, Intae Ryoo:

The internet of everything based on energy efficient P2P transmission technology with Bluetooth low energy. 520-528 - Ho-Kyung Yang

, Hyun-Jong Cha
, Yong-Ho Kim:
mVoIP for P2P service based authentication system using AA authentication server. 529-538 - Woo-Sik Bae:

Designing and verifying a P2P service security protocol in M2M environment. 539-545 - Hoill Jung, Kyung-Yong Chung:

P2P context awareness based sensibility design recommendation using color and bio-signal analysis. 546-557 - Hyun-Jong Cha

, Ho-Kyung Yang
, Yong-Ho Kim:
A node management scheme for stable P2P service in mobile ad-hoc networks. 558-565 - Kyung-Yong Chung, Roy C. Park:

P2P cloud network services for IoT based disaster situations information. 566-577 - Hwan-Seok Yang, Jae Hoon Sun:

A study on hybrid trust evaluation model for identifying malicious behavior in mobile P2P. 578-587 - Jong Tak Kim, Hee-Jun Pan, Jonghun Kim:

P2P-based u-health cluster service model for silver generation in PBR platform. 588-598 - Kun Lu, Junlong Wang, Mingchu Li:

An Eigentrust dynamic evolutionary model in P2P file-sharing systems. 599-612
Volume 9, Number 4, July 2016
- Mianxiong Dong, Fen Hou, Peng Cheng, Kyoung-Sook Kim

:
Guest editorial: Special issue on crowd sensing networks. 613-615 - Xiaoheng Deng, Lifang He, Xu Li, Qiang Liu, Lin Cai

, Zhigang Chen:
A reliable QoS-aware routing scheme for neighbor area network in smart grid. 616-627 - Yeonsu Jung, Yunju Baek:

Multi-hop data forwarding method for crowd sensing networks. 628-639 - Ghofrane Fersi

, Wassef Louati, Maher Ben Jemaa:
CLEVER: Cluster-based Energy-aware Virtual Ring Routing in randomly deployed wireless sensor networks. 640-655 - Tingting Yang, Chengming Yang, Hailong Feng, Ruilong Deng

:
Perceiving who and when to leverage data delivery for maritime networks: An optimal stopping view. 656-669 - Jingguo Ge, Shaojie Wang, Yulei Wu, Haina Tang, Yuepeng E:

Performance improvement for source mobility in named data networking based on global-local FIB updates. 670-680 - Kaimin Wei, Song Guo

, Xiangli Li, Deze Zeng, Ke Xu:
Congestion control in social-based sensor networks: A social network perspective. 681-691 - Xiao Liu, Kaoru Ota

, Anfeng Liu, Zhigang Chen:
An incentive game based evolutionary model for crowd sensing networks. 692-711 - Qichao Xu, Zhou Su, Bo Han, Dongfeng Fang, Zejun Xu, Xiaoying Gan:

Analytical model with a novel selfishness division of mobile nodes to participate cooperation. 712-720 - Thejaswini M

, Pachamuthu Rajalakshmi
, Uday B. Desai:
Duration of stay based weighted scheduling framework for mobile phone sensor data collection in opportunistic crowd sensing. 721-730 - Nilesh Padhariya, Anirban Mondal, Sanjay Kumar Madria:

Top-k query processing in mobile-P2P networks using economic incentive schemes. 731-751 - Weidong Yang, Yunhua He, Limin Sun, Xiang Lu, Xinghua Li:

An optimal query strategy for protecting location privacy in location-based services. 752-761 - Hongwei Li, Kun Jia, Haomiao Yang, Dongxiao Liu, Liang Zhou:

Practical blacklist-based anonymous authentication scheme for mobile crowd sensing. 762-773 - Jun Zhou, Zhenfu Cao

, Xiaolei Dong:
Secure and efficient fine-grained multiple file sharing in cloud-assisted crowd sensing networks. 774-794 - Mohammed El-Amine Cheriet, Mohamed Ouslim, Boualam Belaidi:

The implementation of indoor localization based on an experimental study of RSSI using a wireless sensor network. 795-808
Volume 9, Number 5, September 2016
- Haider Abbas

, Sana Ullah, Sudip Misra
, Yuh-Shyan Chen
:
Guest editorial: Secure cloud computing for mobile health services. 809-811 - Ramzi A. Haraty

, Mirna Zbib, Mehedi Masud
:
Data damage assessment and recovery algorithm from malicious attacks in healthcare data sharing systems. 812-823 - Neeraj Kumar

, Kuljeet Kaur
, Subhas C. Misra, Rahat Iqbal
:
An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud. 824-840 - Zeeshan Siddiqui, Abdul Hanan Abdullah, Muhammad Khurram Khan

, Abdullah Sharaf Alghamdi:
Cryptanalysis and improvement of 'a secure authentication scheme for telecare medical information system' with nonce verification. 841-853 - Yongjun Ren

, Jian Shen, Yuhui Zheng, Jin Wang
, Han-Chieh Chao
:
Efficient data integrity auditing for storage security in mobile health cloud. 854-863 - Meiyu Huang

, Yiqiang Chen
, Bo-Wei Chen, Junfa Liu, Seungmin Rho, Wen Ji:
A semi-supervised privacy-preserving clustering algorithm for healthcare. 864-875 - Jaime Lloret

, Sandra Sendra, José Miguel Jiménez
, Lorena Parra
:
Providing security and fault tolerance in P2P connections between clouds for mHealth services. 876-893 - Sk. Md. Mizanur Rahman

, Md. Mehedi Masud
, M. Anwar Hossain
, Abdulhameed Alelaiwi, Mohammad Mehedi Hassan, Atif Alamri:
Privacy preserving secure data exchange in mobile P2P cloud healthcare environment. 894-909 - Young-June Choi, Alexander W. Min, Zhetao Li:

Guest editorial: Special issue on device-to-device service and network management for beyond 4G mobile networks. 910-912 - Jongwoo Hong, Seungil Park, Sunghyun Choi

:
Novel power control and collision resolution schemes for device-to-device discovery. 913-922 - Wenjun Xu, Shengyu Li, Yue Xu, Xuehong Lin:

Underlaid-D2D-assisted cooperative multicast based on social networks. 923-935 - Fu Xiao, Xiaohui Xie, Zhifei Jiang, Lijuan Sun, Ruchuan Wang:

Utility-aware data transmission scheme for delay tolerant networks. 936-944 - Shijie Sun, Kwang-Yul Kim

, Oh-Soon Shin, Yoan Shin:
Device-to-device resource allocation in LTE-advanced networks by hybrid particle swarm optimization and genetic algorithm. 945-954 - Do-Yun Kim, Young-June Choi:

Cooperative device discovery for multi-interface self-organizing networks. 955-964 - Hieu Van Nguyen, Quang Duong, Van-Dinh Nguyen

, Yoan Shin, Oh-Soon Shin:
Optimization of resource allocation for underlay device-to-device communications in cellular networks. 965-977
Volume 9, Number 6, November 2016
- S. Rajkumar

, Neeraj Kumar Goyal
:
Reliable multistage interconnection network design. 979-990 - Wail Mardini

, Yaser M. Khamayseh
, Abedl Rahman Almodawar
, Ehab S. Elmallah:
Adaptive RSSI-based localization scheme for wireless sensor networks. 991-1004 - Zhi-yuan Li, Lu Liu

, Rulong Chen, Jun-lei Bi:
An adaptive secure communication framework for mobile peer-to-peer environments using Bayesian games. 1005-1019 - Qiyi Han

, Hong Wen, Gang Feng, Bin Wu, Mengyin Ren:
Self-nominating trust model based on hierarchical fuzzy systems for peer-to-peer networks. 1020-1030 - Michele Amoretti, Carlos Gershenson

:
Measuring the complexity of adaptive peer-to-peer systems. 1031-1046 - Peng Qin, Bin Dai, Guan Xu, Kui Wu, Benxiong Huang:

Taking a free ride for routing topology inference in peer-to-peer networks. 1047-1059 - Bo Zhang

, S.-H. Gary Chan:
Overlay construction for mobile peer-to-peer video broadcasting - Approaches and comparisons. 1060-1073 - Müge Sayit, Sercan Demirci, Yagiz Kaymak, Emrullah Turhan Tunali:

Adaptive, incentive and scalable dynamic tree overlay for P2P live video streaming. 1074-1088 - Yi Zheng, Fuhong Lin

, Yansong Yang, Tong Gan:
Adaptive resource scheduling mechanism in P2P file sharing system. 1089-1100 - Ruchir Gupta

, Nitin Singha
, Yatindra Nath Singh:
Reputation based probabilistic resource allocation for avoiding free riding and formation of common interest groups in unstructured P2P networks. 1101-1113 - Chow-Sing Lin, Jhe-Wei Lin:

UR-aware: Streaming videos over BitTorrent with balanced playback urgency and rareness distribution. 1114-1125 - Laura Ricci

, Alexandru Iosup
, Radu Prodan
:
Large scale distributed cooperative environments on clouds and P2P. 1126-1127 - Alireza Naghizadeh, Behrooz Razeghi

, Ehsan Meamari, Majid Hatamian
, Reza Ebrahimi Atani
:
C-trust: A trust management system to improve fairness on circular P2P networks. 1128-1144 - Radu Prodan

, Alexandru Iosup
:
Operation analysis of massively multiplayer online games on unreliable resources. 1145-1161 - Maria Efthymiopoulou, Nikolaos Efthymiopoulos, Athanasios Christakidis, Nikolaos Athanasopoulos, Spyros G. Denazis, Odysseas G. Koufopavlou:

Scalable playback rate control in P2P live streaming systems. 1162-1176 - Barbara Guidi, Tobias Amft, Andrea De Salve

, Kalman Graffi
, Laura Ricci
:
DiDuSoNet: A P2P architecture for distributed Dunbar-based social networks. 1177-1194 - Valerio Arnaboldi

, Massimiliano La Gala, Andrea Passarella
, Marco Conti
:
Information diffusion in distributed OSN: The impact of trusted relationships. 1195-1208 - Shree Garg

, Sateesh Kumar Peddoju, Anil Kumar Sarje:
Scalable P2P bot detection system based on network data stream. 1209-1225 - Michele Amoretti, Alessandro Grazioli

, Francesco Zanichelli
:
An autonomic approach for P2P/cloud collaborative environments. 1226-1241 - Moulay Driss Mechaoui

, Nadir Guetmi, Abdessamad Imine:
MiCa: Lightweight and mobile collaboration across a collaborative editing service in the cloud. 1242-1269 - Stefano Ferretti:

Self-healing protocols for connectivity maintenance in unstructured overlays. 1270-1292

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














