Peer-to-Peer Networking and Applications

短名Peer-to-Peer Netw. Appl.
Journal Impact3.40
国际分区TELECOMMUNICATIONS(Q2)
期刊索引SCI Q2中科院 4 区
ISSN1936-6442, 1936-6450
h-index48
国内分区计算机科学(4区)计算机科学计算机信息系统(4区)计算机科学电信学(4区)

PEER-TO-PEER NETWORKING AND APPLICATIONS 期刊的目的是在这个快速发展的研究领域传播最先进的研究和开发成果,促进 P2P 网络和应用程序的部署,并汇集学术和行业社区,旨在促进互动以促进进一步的研究兴趣和活动,从而实现新的 P2P 应用程序和服务。该杂志不仅涉及与网络和通信理论相关的研究主题,还考虑了 P2P 技术的标准化、经济和工程方面,以及它们对软件工程、计算机工程、网络通信和安全的影响。该杂志是解决文件共享和媒体流应用程序产生的技术问题的论坛。它还包括 P2P 安全领域的最先进技术。PEER-TO-PEER NETWORKING AND APPLICATIONS 定期发布论文、教程和评论论文、案例研究以及来自研究、开发和标准化社区的信件。鼓励发表解决系统、应用程序和服务问题的论文。

期刊主页投稿网址
涉及主题计算机科学操作系统计算机网络工程类计算机安全数学分布式计算万维网电信程序设计语言法学政治学物理经济生物人工智能电气工程量子力学统计算法生态学嵌入式系统
出版信息出版商: Springer New York出版周期: 6 issues per year期刊类型: journal
基本数据创刊年份: 2009原创研究文献占比99.36%自引率:6.10%Gold OA占比: 3.34%
平均审稿周期 网友分享经验:>12周,或约稿
平均录用比例网友分享经验:容易

期刊引文格式

这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。

并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。

只有1位作者的期刊

有2位作者的期刊

有3位作者的期刊

有5位以上作者的期刊

书籍引用格式

以下是创作和编辑的书籍的参考文献的示例。

学位论文引用格式

网页引用格式

这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。

专利引用格式

最新文章

Homomorphic multi-party computation for Internet of Medical Things

2024-9-12

Towards real-time non-preemptive multicast scheduling in reconfigurable data center networks

2024-9-12

BPPKS: A blockchain-based privacy preserving and keyword-searchable scheme for medical data sharing

2024-9-11

An efficient energy supply policy and optimized self-adaptive data aggregation with deep learning in heterogeneous wireless sensor network

2024-9-10

A Blockchain-assisted lightweight privacy preserving authentication protocol for peer-to-peer communication in vehicular ad-hoc network

2024-9-10

Mainstay: A hybrid protocol ensuring ledger temporality and security

2024-9-9

IoV block secure: blockchain based secure data collection and validation framework for internet of vehicles network

2024-9-9

Blockchain abetted energy efficient archerfish hunting and Namib Beetle optimization algorithm espoused clustering protocol for wireless sensor network

2024-9-9

Securing IoT data: Fog computing, blockchain, and tailored privacy-enhancing technologies in action

2024-9-7

Integrating deep learning and metaheuristics algorithms for blockchain-based reassurance data management in the detection of malicious IoT nodes

2024-9-5

End to end delay aware service function chain scheduling in network function virtualization enabled networks

2024-9-5

Transaction graph based key node identification for blockchain regulation

2024-9-4

A secure and trusted consensus protocol for blockchain-enabled supply chain management system

2024-9-4

Security analysis and trends in signcryption for WBAN: A research study

2024-9-3

Blockchain-based intelligent tracing of food grain crops from production to delivery

2024-9-2

DWAMA: Dynamic weight-adjusted mahalanobis defense algorithm for mitigating poisoning attacks in federated learning

2024-9-2

D2D-assisted cooperative computation offloading and resource allocation in wireless-powered mobile edge computing networks

2024-9-2

Fog computing and blockchain technology based certificateless authentication scheme in 5G-assisted vehicular communication

2024-8-31

CrowdChain: A privacy-preserving crowdfunding system based on blockchain and PUF

2024-8-29

MRNQ: Machine learning-based reliable node quester for reliable communication in underwater acoustic sensor networks

2024-8-29

Distributed and latency-aware beaconing for asynchronous duty-cycled IoT networks

2024-8-27

SRFE: A stepwise recursive feature elimination approach for network intrusion detection systems

2024-8-22

An energy efficient access control for secured intelligent transportation system for 6G networking in VANET

2024-8-21

SusChain: a sustainable sharding scheme for UAV blockchain networks

2024-8-16

EduCopyRight-Chain: an educational resources copyright protection system utilizing permissionless blockchain and non-fungible tokens

2024-8-14

Deployment optimization in wireless sensor networks using advanced artificial bee colony algorithm

2024-8-13

Correction to: Minimization of VANET execution time based on joint task offloading and resource allocation

2024-8-5

A feature selection model using binary FOX optimization and v-shaped transfer function for network IDS

2024-8-3

A delay aware routing approach for FANET based on emperor penguins colony algorithm

2024-7-31

A multi-receiver certificateless public-key searchable encryption: Field-free subset conjunctive and disjunctive

2024-7-31

A multi-edge jointly offloading method considering group cooperation topology features in edge computing networks

2024-7-30

Temporary relay: A more flexible way to cross chains

2024-7-27

Enhancing paillier to fully homomorphic encryption with semi-honest TEE

2024-7-25

Proxy re-signature scheme with cryptographic reverse firewall for medical data security

2024-7-25

Blockchain based multi-signature smart contract electronic seal orienting mobile IoT terminals

2024-7-21

Dynamic load scheduling and power allocation for energy efficiency and cost reduction in smart grids: An RL-SAL-BWO approach

2024-7-20

Energy Efficient Routing Mechanism Based on Similarity Guided Graph Neural Network and Decision Tree with Golden Eagle Optimization in VSN

2024-7-19

A hierarchical hybrid intrusion detection model for industrial internet of things

2024-7-18

Exploiting smartphone defence: a novel adversarial malware dataset and approach for adversarial malware detection

2024-7-15

Flexible localization protocol for underwater wireless sensor networks using hybrid reward evaluation scheme

2024-7-12

Dcaro: Dynamic cluster formation and AUV-aided routing optimization for energy-efficient UASNs

2024-7-12

Online budget-limited pricing incentives for remote mobile sensing

2024-7-5

An integrated MCDM-based charging scheduling in a WRSN with multiple MCs

2024-7-5

MS-EAR: A mobile sink based energy aware routing technique for SDN enabled WSNs

2024-7-5

Secure communication routing and attack detection in UAV networks using Gannet Walruses optimization algorithm and Sheppard Convolutional Spinal Network

2024-7-3

Secure multi-asks/bids with verifiable equality retrieval for double auction in smart grid

2024-7-1

Incentive minimization using energy and buffer efficient routing protocol over Blockchain enabled DTN

2024-6-28

Correction to: Certificate-less Aggregate Signature Authentication Scheme (CLASAS) for secure and efficient data transmission in Wireless Sensor Networks (WSNs)

2024-6-27

A smart contract vulnerability detection method based on deep learning with opcode sequences

2024-6-27

Verifiable privacy-preserving cox regression from multi-key fully homomorphic encryption

2024-6-26

帮你贴心管理全部的文献

研飞ivySCI,高效的论文管理

投稿经验分享

分享我的经验,帮你走得更远

Built withby Ivy Science
Copyright © 2020-2024
版权所有:南京青藤格致信息科技有限公司