Peer-to-Peer Networking and Applications gratefully acknowledges the editorial work of the following scholars:

  • Chang Hoon Lee, Hanshin University, Korea

  • Shiuh-Jeng WANG, Central Police University, Taiwan

  • Liudong Xing, University of Massachusetts, Dartmouth, USA

on this special issue devoted to Technologies and Theories in P2P Converged Ubiquitous Networks

The papers in this issue include:

  • An effective authentication mechanism for ubiquitous collaboration in heterogeneous computing environment, Soobok Shin, Taeshik Shon, HongjinYeh, Kangseok Kim

  • Anonymous proximity mobile payment (APMP), Sadiq Almuairfi, Prakash Veeraraghavan, Naveen Chilamkurti, Doo-Soon Park

  • Router architecture evaluation for security network, Yungho Choi, Lark-Kyo Kim, Hyungkeun Ahn, Neungsoo Park

  • Security analysis of block cipher Piccolo suitable for wireless sensor networks, Kitae Jeong

  • A novel method of mining network flow to detect P2P botnets, Shu-Chiung Lin, Patrick S. Chen, Chia-Ching Chang

  • The optimal split method of large integer multiplication for smart low-end devices on P2P ubiquitous networks, Ren-Junn Hwang, Loang-Shing Huang

  • A real-time responsiveness measurement method of linux-based mobile systems for P2P cloud systems, Yung-Joon Jung, Donghyouk Lim, Yong Bon Koo, Eun-Ser Lee, Hoon Choi

  • VQ-based algorithms extended to non-embedded watermarking for multimedia ownership prevention systems, Wei-Jen Wang, Cheng-Ta Huang, Cheng-Hsing Yang, Shiuh-Jeng Wang

  • Exposing mobile malware from the inside (or what is your mobile app really doing?), Dimitrios Damopoulos, Georgios Kambourakis, Stefanos Gritzalis, Sang Oh Park

  • Key distribution scheme for peer-to-peer communication in mobile underwater wireless sensor networks, Kubra Kalkan, Albert Levi

  • Algorithms for promoting anonymity of BS and for prolonging network lifetime of WSN, Joy Iong-Zong Chen, Chu-Hsing Lin

  • Image reversibility in data embedding on the basis of blocking-predictions, Fu-Hau Hsu, Min-Hao Wu, Cheng-Hsing Yang, Shiuh-Jeng Wang

  • Securing one-way hash chain based incentive mechanism for vehicular ad hoc networks, Joon-Sang Park, Seung Jun Beak

  • Low-priced and efficient replica detection framework for wireless sensor networks, Kwantae Cho, Dong Hoon Lee