研飞客户端支持数万种期刊查询,助你在阅读和写作中随时了解期刊动态

Peer-to-Peer Networking and Applications

短名Peer-to-Peer Netw. Appl.
Journal Impact3.40
国际分区TELECOMMUNICATIONS(Q2)
期刊索引SCI Q2中科院 4 区
ISSN1936-6442, 1936-6450
h-index48
国内分区计算机科学(4区)计算机科学计算机信息系统(4区)计算机科学电信学(4区)

《Peer-to-Peer Networking and Applications》期刊旨在传播这一快速发展的研究领域中的前沿研究和开发成果,促进P2P网络和应用的部署,并汇聚学术界和工业界的社区,以推动互动,激发进一步的研究兴趣和活动,从而实现新的P2P应用和服务。该期刊不仅涵盖与网络和通信理论相关的研究主题,还关注P2P技术的标准化、经济和工程方面,以及这些技术对软件工程、计算机工程、网络通信和安全的影响。它为解决文件共享和媒体流应用中出现的技术问题提供了一个论坛,并包括P2P安全领域的最新技术。《Peer-to-Peer Networking and Applications》定期发布论文、教程、评论、案例研究以及来自研究、开发和标准化社区的信件。鼓励发表解决系统、应用和服务问题的论文。

期刊主页投稿网址

阅读文献时,研飞即可帮你快速了解期刊,查询影响因子与分区,智能高亮期刊预警!

涉及主题计算机科学操作系统计算机网络工程类计算机安全数学分布式计算万维网电信程序设计语言法学政治学物理经济生物人工智能电气工程量子力学统计算法生态学嵌入式系统
出版信息出版商: Springer New York出版周期: 6 issues per year期刊类型: journal
基本数据创刊年份: 2009原创研究文献占比99.36%自引率:6.10%Gold OA占比: 3.34%
平均审稿周期 网友分享经验:>12周,或约稿
平均录用比例网友分享经验:容易

期刊引文格式

这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。

并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。

只有1位作者的期刊

有2位作者的期刊

有3位作者的期刊

有5位以上作者的期刊

书籍引用格式

以下是创作和编辑的书籍的参考文献的示例。

学位论文引用格式

网页引用格式

这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。

专利引用格式

手工熬夜修改参考文献?研飞自动匹配期刊,一键轻松成稿,支持 Word/WPS

点击下方按钮,免费开启试用!

最新文章

Secure and lightweight key agreement protocol for remote surgery over tactile internet using physically unclonable functions

2024-10-2

An ensemble learning approach for intrusion detection in IoT-based smart cities

2024-9-27

Secure electronic medical records sharing scheme based on blockchain by using proxy re-encryption

2024-9-26

A multi-user mobile edge computing task offloading and trajectory management based on proximal policy optimization

2024-9-26

Privacy-preserving Apriori-based association rule mining over semantically secure encrypted cloud database

2024-9-25

BeLAS: Blockchain-envisioned lightweight authentication scheme for securing eHealth records

2024-9-25

A traffic flow prediction framework based on integrated federated learning and Recurrent Long short-term networks

2024-9-24

SCMABC Algorithm-based routing for secure and efficient data transmission in smart grid AMI networks

2024-9-24

Homomorphic multi-party computation for Internet of Medical Things

2024-9-12

Towards real-time non-preemptive multicast scheduling in reconfigurable data center networks

2024-9-12

BPPKS: A blockchain-based privacy preserving and keyword-searchable scheme for medical data sharing

2024-9-11

An efficient energy supply policy and optimized self-adaptive data aggregation with deep learning in heterogeneous wireless sensor network

2024-9-10

A Blockchain-assisted lightweight privacy preserving authentication protocol for peer-to-peer communication in vehicular ad-hoc network

2024-9-10

Mainstay: A hybrid protocol ensuring ledger temporality and security

2024-9-9

Blockchain abetted energy efficient archerfish hunting and Namib Beetle optimization algorithm espoused clustering protocol for wireless sensor network

2024-9-9

IoV block secure: blockchain based secure data collection and validation framework for internet of vehicles network

2024-9-9

Securing IoT data: Fog computing, blockchain, and tailored privacy-enhancing technologies in action

2024-9-7

Integrating deep learning and metaheuristics algorithms for blockchain-based reassurance data management in the detection of malicious IoT nodes

2024-9-5

End to end delay aware service function chain scheduling in network function virtualization enabled networks

2024-9-5

Transaction graph based key node identification for blockchain regulation

2024-9-4

A secure and trusted consensus protocol for blockchain-enabled supply chain management system

2024-9-4

Security analysis and trends in signcryption for WBAN: A research study

2024-9-3

Blockchain-based intelligent tracing of food grain crops from production to delivery

2024-9-2

DWAMA: Dynamic weight-adjusted mahalanobis defense algorithm for mitigating poisoning attacks in federated learning

2024-9-2

D2D-assisted cooperative computation offloading and resource allocation in wireless-powered mobile edge computing networks

2024-9-2

Fog computing and blockchain technology based certificateless authentication scheme in 5G-assisted vehicular communication

2024-8-31

CrowdChain: A privacy-preserving crowdfunding system based on blockchain and PUF

2024-8-29

MRNQ: Machine learning-based reliable node quester for reliable communication in underwater acoustic sensor networks

2024-8-29

Distributed and latency-aware beaconing for asynchronous duty-cycled IoT networks

2024-8-27

SRFE: A stepwise recursive feature elimination approach for network intrusion detection systems

2024-8-22

An energy efficient access control for secured intelligent transportation system for 6G networking in VANET

2024-8-21

SusChain: a sustainable sharding scheme for UAV blockchain networks

2024-8-16

EduCopyRight-Chain: an educational resources copyright protection system utilizing permissionless blockchain and non-fungible tokens

2024-8-14

Deployment optimization in wireless sensor networks using advanced artificial bee colony algorithm

2024-8-13

Correction to: Minimization of VANET execution time based on joint task offloading and resource allocation

2024-8-5

A feature selection model using binary FOX optimization and v-shaped transfer function for network IDS

2024-8-3

A delay aware routing approach for FANET based on emperor penguins colony algorithm

2024-7-31

A multi-receiver certificateless public-key searchable encryption: Field-free subset conjunctive and disjunctive

2024-7-31

A multi-edge jointly offloading method considering group cooperation topology features in edge computing networks

2024-7-30

Temporary relay: A more flexible way to cross chains

2024-7-27

Enhancing paillier to fully homomorphic encryption with semi-honest TEE

2024-7-25

Proxy re-signature scheme with cryptographic reverse firewall for medical data security

2024-7-25

Blockchain based multi-signature smart contract electronic seal orienting mobile IoT terminals

2024-7-21

Dynamic load scheduling and power allocation for energy efficiency and cost reduction in smart grids: An RL-SAL-BWO approach

2024-7-20

Energy Efficient Routing Mechanism Based on Similarity Guided Graph Neural Network and Decision Tree with Golden Eagle Optimization in VSN

2024-7-19

A hierarchical hybrid intrusion detection model for industrial internet of things

2024-7-18

Exploiting smartphone defence: a novel adversarial malware dataset and approach for adversarial malware detection

2024-7-15

Flexible localization protocol for underwater wireless sensor networks using hybrid reward evaluation scheme

2024-7-12

Dcaro: Dynamic cluster formation and AUV-aided routing optimization for energy-efficient UASNs

2024-7-12

Online budget-limited pricing incentives for remote mobile sensing

2024-7-5

帮你贴心管理全部的文献

研飞ivySCI,高效的论文管理

投稿经验分享

分享我的经验,帮你走得更远

Built withby Ivy Science
Copyright © 2020-2024
版权所有:南京青藤格致信息科技有限公司