Peer-to-peer networking and applications
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
Table of contents
- 555
-
Distributed hybrid P2P networking systemsHan, Jungsoo et al. | 2014
- 557
-
QoS-aware data forwarding architecture for multimedia streaming services in hybrid peer-to-peer networksKim, Seokhoon et al. | 2014
- 567
-
A hybrid Wi-Fi P2P with bluetooth low energy for optimizing smart device’s communication propertyJoh, Hangki / Ryoo, Intae et al. | 2014
- 578
-
Annotation alignment method on P2P-TV systemPark, Seung-Bo / Chung, Kyungyong et al. | 2014
- 587
-
Key exchange process of PIM-SM-based for Multiple Group Communication in P2PKim, Si-Jung / Kim, Bong-Han et al. | 2014
- 596
-
Information retrieval system using the keyword concept net of the P2P service-based in the mobile cloud environmentMoon, Seok-Jae / Yoon, Chang-Pyo et al. | 2014
- 610
-
Estimating unreliable objects and system reliability in P2P networksKim, Kapsu / Hong, Myunghui / Chung, Kyungyong et al. | 2014
- 620
-
Extracting real IP address used to connect to P2P messenger using ARIT agentKim, Yong-Ho / Sun, Jae Hoon et al. | 2014
- 631
-
The biometric signature delegation scheme to balance the load of digital signing in hybrid P2P networksYun, Sunghyun / Lim, Heuiseok / Chung, Kyungyong et al. | 2014
- 641
-
Editor’s Note: Special issue on advanced P2P security and privacy| 2015
- 642
-
Securing network coding against pollution attacks in P2P converged ubiquitous networksHe, Ming / Gong, Zhenghu / Chen, Lin et al. | 2013
- 651
-
LSC2: An extended link state protocol with centralized controlZhao, Dan / Wu, Chunqing / Hu, Xiaofeng et al. | 2013
- 664
-
Merging sub-networks in VANETs by using the IEEE 802.11xx protocolsCaballero-Gil, Cándido / Caballero-Gil, Pino / Molina-Gil, Jezabel et al. | 2014
- 674
-
An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networksShin, Soobok / Yeh, Hongjin / Kim, Kangseok et al. | 2013
- 684
-
An approach to mitigate DoS attack based on routing misbehavior in wireless ad hoc networksLee, Gunhee / Kim, Wonil / Kim, Kangseok et al. | 2013
- 694
-
A study on memory dump analysis based on digital forensic toolsSeo, Jungtaek / Lee, Seokjun / Shon, Taeshik et al. | 2013
- 704
-
Network processor architecture with flow-based dynamic bandwidth control for efficient QoS provisioningPark, Jongsu / Lee, Yong-Surk et al. | 2013
- 716
-
Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysisJeong, Kitae / Kang, HyungChul / Lee, Changhoon et al. | 2013