共 50 条
- [1] Design and implementation of a P2P shared Web browser using JXTA Proc. Int. Conf. Adv. Inf. Netw. Appl. AINA, 1600, (111-116):
- [2] A new P2P identity authentication method based on zero-knowledge under hybrid P2P network Pang, X. (xiyupang@126.com), 1600, Universitas Ahmad Dahlan, Jalan Kapas 9, Semaki, Umbul Harjo,, Yogiakarta, 55165, Indonesia (11):
- [3] Simulation of DDOS attacks on P2P metworks Proc.- 2011 IEEE International Conference on HPCC 2011 - 2011 IEEE International Workshop on FTDCS 2011 -Workshops of the 2011 Int. Conf. on UIC 2011- Workshops of the 2011 Int. Conf. ATC 2011, 2011, : 610 - 614
- [4] An innovative implementation method of P2P tracker Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2010, 32 (06): : 59 - 63
- [5] Mobile mash-up model based on hybrid P2P using ajax technology Spring Simul. Multiconference, SpringSim,
- [6] Recommendation trust model scheme for P2P network environment Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2009, 32 (03): : 69 - 72
- [8] An optimization model of load balancing in Peer to Peer (P2P) network 2011 International Conference on Computer Science and Service System, CSSS 2011 - Proceedings, 2011, : 2064 - 2067
- [9] A low latency resource location algorithm for unstructured P2P networks Int. Conf. Comput. Intell. Softw. Eng., CiSE, 2010,
- [10] TAP: A novel tunneling approach for anonymity in structured P2P systems International Association for Computers and Communications (IACC); McGill University, Canada; Ohio State University, 1600, 21-26 (2004):