nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comprehensive study of the use of advertisements as incentives in P2P streaming systems
|
Wang, Bo-Chun |
|
2012 |
7 |
4 |
p. 555-571 |
artikel |
2 |
A D-S evidence theory based fuzzy trust model in file-sharing P2P networks
|
Tian, Chunqi |
|
2012 |
7 |
4 |
p. 332-345 |
artikel |
3 |
Algorithms for promoting anonymity of BS and for prolonging network lifetime of WSN
|
Chen, Joy Iong-Zong |
|
2013 |
7 |
4 |
p. 710-722 |
artikel |
4 |
An effective authentication mechanism for ubiquitous collaboration in heterogeneous computing environment
|
Shin, Soobok |
|
2013 |
7 |
4 |
p. 612-619 |
artikel |
5 |
An efficient ECC-based mechanism for securing network coding-based P2P content distribution
|
He, Heng |
|
2013 |
7 |
4 |
p. 572-589 |
artikel |
6 |
An ISP-friendly inter-overlay coordination framework for multiple coexisting P2P systems
|
Yang, Peng |
|
2013 |
7 |
4 |
p. 396-409 |
artikel |
7 |
Anonymous proximity mobile payment (APMP)
|
Almuairfi, Sadiq |
|
2012 |
7 |
4 |
p. 620-627 |
artikel |
8 |
A novel method of mining network flow to detect P2P botnets
|
Lin, Shu-Chiung |
|
2012 |
7 |
4 |
p. 645-654 |
artikel |
9 |
A real-time responsiveness measurement method of linux-based mobile systems for P2P cloud systems
|
Jung, Yung-Joon |
|
2013 |
7 |
4 |
p. 665-675 |
artikel |
10 |
A research on dynamic allocation of network resources based on P2P traffic planning
|
Ma, Dongchao |
|
2012 |
7 |
4 |
p. 511-524 |
artikel |
11 |
A scalable P2P overlay based on arrangement graph with minimized overhead
|
Lu, Ssu-Hsuan |
|
2013 |
7 |
4 |
p. 497-510 |
artikel |
12 |
BufferBank: A distributed cache infrastructure for peer-to-peer application
|
Huang, Bin |
|
2012 |
7 |
4 |
p. 485-496 |
artikel |
13 |
Detecting P2P botnets by discovering flow dependency in C&C traffic
|
Jiang, Hongling |
|
2012 |
7 |
4 |
p. 320-331 |
artikel |
14 |
Distributed Denial of Service (DDoS) detection by traffic pattern analysis
|
Thapngam, Theerasak |
|
2012 |
7 |
4 |
p. 346-358 |
artikel |
15 |
Editor’s Note: Special issue on Technologies and Theories in P2P Converged Ubiquitous Networks
|
|
|
2014 |
7 |
4 |
p. 611 |
artikel |
16 |
Exposing mobile malware from the inside (or what is your mobile app really doing?)
|
Damopoulos, Dimitrios |
|
2012 |
7 |
4 |
p. 687-697 |
artikel |
17 |
Group formation with neighbor similarity trust in P2P E-commerce
|
Musau, Felix |
|
2011 |
7 |
4 |
p. 295-310 |
artikel |
18 |
Hierarchical architectures in structured peer-to-peer overlay networks
|
Korzun, Dmitry |
|
2013 |
7 |
4 |
p. 359-395 |
artikel |
19 |
Hybrid fluid modeling approach for performance analysis of P2P live video streaming systems
|
Kotevski, Zoran |
|
2013 |
7 |
4 |
p. 410-426 |
artikel |
20 |
Image reversibility in data embedding on the basis of blocking-predictions
|
Hsu, Fu-Hau |
|
2013 |
7 |
4 |
p. 723-736 |
artikel |
21 |
Improving sustainability of BitTorrent darknets
|
Chen, Xiaowei |
|
2012 |
7 |
4 |
p. 539-554 |
artikel |
22 |
Key distribution scheme for peer-to-peer communication in mobile underwater wireless sensor networks
|
Kalkan, Kubra |
|
2012 |
7 |
4 |
p. 698-709 |
artikel |
23 |
Low-priced and efficient replica detection framework for wireless sensor networks
|
Cho, Kwantae |
|
2012 |
7 |
4 |
p. 743-749 |
artikel |
24 |
Modeling the initial stage of a file sharing process on a BitTorrent network
|
Lai, Pierre K. Y. |
|
2011 |
7 |
4 |
p. 311-319 |
artikel |
25 |
Modelling and performance analysis of content sharing and distribution in community networks with infrastructure support
|
Alasaad, Amr |
|
2012 |
7 |
4 |
p. 590-610 |
artikel |
26 |
On the collaboration of different peer-to-peer traffic management schemas
|
Liu, Xin |
|
2012 |
7 |
4 |
p. 459-468 |
artikel |
27 |
Peer-to-peer as an infrastructure service
|
Liu, Jiangchuan |
|
2014 |
7 |
4 |
p. 456-458 |
artikel |
28 |
P2P storage systems: Study of different placement policies
|
Caron, Stéphane |
|
2013 |
7 |
4 |
p. 427-443 |
artikel |
29 |
Router architecture evaluation for security network
|
Choi, Yungho |
|
2012 |
7 |
4 |
p. 628-635 |
artikel |
30 |
Securing one-way hash chain based incentive mechanism for vehicular ad hoc networks
|
Park, Joon-Sang |
|
2012 |
7 |
4 |
p. 737-742 |
artikel |
31 |
Security analysis of block cipher Piccolo suitable for wireless sensor networks
|
Jeong, Kitae |
|
2013 |
7 |
4 |
p. 636-644 |
artikel |
32 |
SocialTrust: Enabling long-term social cooperation in peer-to-peer services
|
Hu, Yusuo |
|
2013 |
7 |
4 |
p. 525-538 |
artikel |
33 |
The optimal split method of large integer multiplication for smart low-end devices on P2P ubiquitous networks
|
Hwang, Ren-Junn |
|
2012 |
7 |
4 |
p. 655-664 |
artikel |
34 |
The performance and locality tradeoff in bittorrent-like file sharing systems
|
Huang, Wei |
|
2013 |
7 |
4 |
p. 469-484 |
artikel |
35 |
Tsunami: A parasitic, indestructible botnet on Kad
|
Memon, Ghulam |
|
2013 |
7 |
4 |
p. 444-455 |
artikel |
36 |
VQ-based algorithms extended to non-embedded watermarking for multimedia ownership prevention systems
|
Wang, Wei-Jen |
|
2013 |
7 |
4 |
p. 676-686 |
artikel |