Stochastic analysis of a churn-tolerant structured peer-to-peer scheme Tim JacobsGopal Pandurangan OriginalPaper 03 February 2012 Pages: 1 - 14
Secure verifier-based three-party password-authenticated key exchange Qiong PuJian WangJi Fu OriginalPaper 29 May 2012 Pages: 15 - 25
Performance evaluation of P2P-TV diffusion algorithms under realistic settings Paolo VegliaDario Rossi OriginalPaper 18 February 2012 Pages: 26 - 45
iDispatcher: A unified platform for secure planet-scale information dissemination Md Sazzadur RahmanGuanhua YanMike Fisk OriginalPaper 19 April 2012 Pages: 46 - 60
Practical authentication scheme for SIP Shuhua WuQiong PuFei Kang OriginalPaper 15 April 2012 Pages: 61 - 74
A popularity-based query scheme in P2P networks using adaptive gossip sampling Leila SharifiSiavash Khorsandi OriginalPaper 01 May 2012 Pages: 75 - 85
Securing BitTorrent using a new reputation-based trust management system Behrooz Shafiee SarjazMaghsoud Abbaspour OriginalPaper 17 May 2012 Pages: 86 - 100
On enhancing reputation management using Peer-to-Peer interaction history Mohammed HawaLoqman As-Sayid-AhmadLoay D. Khalaf OriginalPaper 16 May 2012 Pages: 101 - 113