Peer-to-Peer Networking and Applications
短名 | Peer-to-Peer Netw. Appl. |
Journal Impact | 3.40 |
国际分区 | TELECOMMUNICATIONS(Q2) |
期刊索引 | SCI Q2中科院 4 区 |
ISSN | 1936-6442, 1936-6450 |
h-index | 48 |
国内分区 | 计算机科学(4区)计算机科学计算机信息系统(4区)计算机科学电信学(4区) |
PEER-TO-PEER NETWORKING AND APPLICATIONS 期刊的目的是在这个快速发展的研究领域传播最先进的研究和开发成果,促进 P2P 网络和应用程序的部署,并汇集学术和行业社区,旨在促进互动以促进进一步的研究兴趣和活动,从而实现新的 P2P 应用程序和服务。该杂志不仅涉及与网络和通信理论相关的研究主题,还考虑了 P2P 技术的标准化、经济和工程方面,以及它们对软件工程、计算机工程、网络通信和安全的影响。该杂志是解决文件共享和媒体流应用程序产生的技术问题的论坛。它还包括 P2P 安全领域的最先进技术。PEER-TO-PEER NETWORKING AND APPLICATIONS 定期发布论文、教程和评论论文、案例研究以及来自研究、开发和标准化社区的信件。鼓励发表解决系统、应用程序和服务问题的论文。
期刊主页投稿网址涉及主题 | 计算机科学操作系统计算机网络工程类计算机安全数学分布式计算万维网电信程序设计语言法学政治学物理经济生物人工智能电气工程量子力学统计算法生态学嵌入式系统 |
出版信息 | 出版商: Springer New York,出版周期: 6 issues per year,期刊类型: journal |
基本数据 | 创刊年份: 2009,原创研究文献占比: 99.36%,自引率:6.10%, Gold OA占比: 3.34% |
平均审稿周期 | 网友分享经验:>12周,或约稿 |
平均录用比例 | 网友分享经验:容易 |
期刊引文格式
这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。
并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。
只有1位作者的期刊
有2位作者的期刊
有3位作者的期刊
有5位以上作者的期刊
书籍引用格式
以下是创作和编辑的书籍的参考文献的示例。
学位论文引用格式
网页引用格式
这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。
专利引用格式
最新文章
Homomorphic multi-party computation for Internet of Medical Things
2024-9-12
Towards real-time non-preemptive multicast scheduling in reconfigurable data center networks
2024-9-12
BPPKS: A blockchain-based privacy preserving and keyword-searchable scheme for medical data sharing
2024-9-11
An efficient energy supply policy and optimized self-adaptive data aggregation with deep learning in heterogeneous wireless sensor network
2024-9-10
A Blockchain-assisted lightweight privacy preserving authentication protocol for peer-to-peer communication in vehicular ad-hoc network
2024-9-10
Mainstay: A hybrid protocol ensuring ledger temporality and security
2024-9-9
IoV block secure: blockchain based secure data collection and validation framework for internet of vehicles network
2024-9-9
Blockchain abetted energy efficient archerfish hunting and Namib Beetle optimization algorithm espoused clustering protocol for wireless sensor network
2024-9-9
Securing IoT data: Fog computing, blockchain, and tailored privacy-enhancing technologies in action
2024-9-7
Integrating deep learning and metaheuristics algorithms for blockchain-based reassurance data management in the detection of malicious IoT nodes
2024-9-5
End to end delay aware service function chain scheduling in network function virtualization enabled networks
2024-9-5
Transaction graph based key node identification for blockchain regulation
2024-9-4
A secure and trusted consensus protocol for blockchain-enabled supply chain management system
2024-9-4
Security analysis and trends in signcryption for WBAN: A research study
2024-9-3
Blockchain-based intelligent tracing of food grain crops from production to delivery
2024-9-2
DWAMA: Dynamic weight-adjusted mahalanobis defense algorithm for mitigating poisoning attacks in federated learning
2024-9-2
D2D-assisted cooperative computation offloading and resource allocation in wireless-powered mobile edge computing networks
2024-9-2
Fog computing and blockchain technology based certificateless authentication scheme in 5G-assisted vehicular communication
2024-8-31
CrowdChain: A privacy-preserving crowdfunding system based on blockchain and PUF
2024-8-29
MRNQ: Machine learning-based reliable node quester for reliable communication in underwater acoustic sensor networks
2024-8-29
Distributed and latency-aware beaconing for asynchronous duty-cycled IoT networks
2024-8-27
SRFE: A stepwise recursive feature elimination approach for network intrusion detection systems
2024-8-22
An energy efficient access control for secured intelligent transportation system for 6G networking in VANET
2024-8-21
SusChain: a sustainable sharding scheme for UAV blockchain networks
2024-8-16
EduCopyRight-Chain: an educational resources copyright protection system utilizing permissionless blockchain and non-fungible tokens
2024-8-14
Deployment optimization in wireless sensor networks using advanced artificial bee colony algorithm
2024-8-13
Correction to: Minimization of VANET execution time based on joint task offloading and resource allocation
2024-8-5
A feature selection model using binary FOX optimization and v-shaped transfer function for network IDS
2024-8-3
A delay aware routing approach for FANET based on emperor penguins colony algorithm
2024-7-31
A multi-receiver certificateless public-key searchable encryption: Field-free subset conjunctive and disjunctive
2024-7-31
A multi-edge jointly offloading method considering group cooperation topology features in edge computing networks
2024-7-30
Temporary relay: A more flexible way to cross chains
2024-7-27
Enhancing paillier to fully homomorphic encryption with semi-honest TEE
2024-7-25
Proxy re-signature scheme with cryptographic reverse firewall for medical data security
2024-7-25
Blockchain based multi-signature smart contract electronic seal orienting mobile IoT terminals
2024-7-21
Dynamic load scheduling and power allocation for energy efficiency and cost reduction in smart grids: An RL-SAL-BWO approach
2024-7-20
Energy Efficient Routing Mechanism Based on Similarity Guided Graph Neural Network and Decision Tree with Golden Eagle Optimization in VSN
2024-7-19
A hierarchical hybrid intrusion detection model for industrial internet of things
2024-7-18
Exploiting smartphone defence: a novel adversarial malware dataset and approach for adversarial malware detection
2024-7-15
Flexible localization protocol for underwater wireless sensor networks using hybrid reward evaluation scheme
2024-7-12
Dcaro: Dynamic cluster formation and AUV-aided routing optimization for energy-efficient UASNs
2024-7-12
Online budget-limited pricing incentives for remote mobile sensing
2024-7-5
An integrated MCDM-based charging scheduling in a WRSN with multiple MCs
2024-7-5
MS-EAR: A mobile sink based energy aware routing technique for SDN enabled WSNs
2024-7-5
Secure communication routing and attack detection in UAV networks using Gannet Walruses optimization algorithm and Sheppard Convolutional Spinal Network
2024-7-3
Secure multi-asks/bids with verifiable equality retrieval for double auction in smart grid
2024-7-1
Incentive minimization using energy and buffer efficient routing protocol over Blockchain enabled DTN
2024-6-28
Correction to: Certificate-less Aggregate Signature Authentication Scheme (CLASAS) for secure and efficient data transmission in Wireless Sensor Networks (WSNs)
2024-6-27
A smart contract vulnerability detection method based on deep learning with opcode sequences
2024-6-27
Verifiable privacy-preserving cox regression from multi-key fully homomorphic encryption
2024-6-26
帮你贴心管理全部的文献
研飞ivySCI,高效的论文管理
投稿经验分享
分享我的经验,帮你走得更远