Skip to main content

Peer-to-Peer Networking and Applications

Ausgabe 4/2014

Includes 2 special issues: Peer-to-peer as an Infrastructure Service; Technologies and Theories in P2P Converged Ubiquitous Networks

Inhalt (36 Artikel)

Group formation with neighbor similarity trust in P2P E-commerce

Felix Musau, Guojun Wang, Muhammad Bashir Abdullahi

Modeling the initial stage of a file sharing process on a BitTorrent network

Pierre K. Y. Lai, K. P. Chow, Lucas C. K. Hui, S. M. Yiu

Distributed Denial of Service (DDoS) detection by traffic pattern analysis

Theerasak Thapngam, Shui Yu, Wanlei Zhou, S. Kami Makki

P2P storage systems: Study of different placement policies

Stéphane Caron, Frédéric Giroire, Dorian Mazauric, Julian Monteiro, Stéphane Pérennes

Tsunami: A parasitic, indestructible botnet on Kad

Ghulam Memon, Jun Li, Reza Rejaie

Peer-to-peer as an infrastructure service

Jiangchuan Liu, Ke Xu, Yongqiang Xiong, Dongchao Ma, Kai Shuang

The performance and locality tradeoff in bittorrent-like file sharing systems

Wei Huang, Chuan Wu, Zongpeng Li, Francis C.M. Lau

BufferBank: A distributed cache infrastructure for peer-to-peer application

Bin Huang, Zhigang Sun, Hongyi Chen, Jianbiao Mao, Ziwen Zhang

A scalable P2P overlay based on arrangement graph with minimized overhead

Ssu-Hsuan Lu, Kuan-Ching Li, Kuan-Chou Lai, Yeh-Ching Chung

A research on dynamic allocation of network resources based on P2P traffic planning

Dongchao Ma, Xiaoliang Wang, Wenlong Chen, Shen Yang, Li Ma

Improving sustainability of BitTorrent darknets

Xiaowei Chen, Xiaowen Chu, Zongpeng Li

Anonymous proximity mobile payment (APMP)

Sadiq Almuairfi, Prakash Veeraraghavan, Naveen Chilamkurti, Doo-Soon Park

Router architecture evaluation for security network

Yungho Choi, Lark-Kyo Kim, Hyungkeun Ahn, Neungsoo Park

A novel method of mining network flow to detect P2P botnets

Shu-Chiung Lin, Patrick S. Chen, Chia-Ching Chang

A real-time responsiveness measurement method of linux-based mobile systems for P2P cloud systems

Yung-Joon Jung, Donghyouk Lim, Yong Bon Koo, Eun-Ser Lee, Hoon Choi

Exposing mobile malware from the inside (or what is your mobile app really doing?)

Dimitrios Damopoulos, Georgios Kambourakis, Stefanos Gritzalis, Sang Oh Park

Image reversibility in data embedding on the basis of blocking-predictions

Fu-Hau Hsu, Min-Hao Wu, Cheng-Hsing Yang, Shiuh-Jeng Wang