-
1
-
-
84892444069
-
An indicator kriging method for distributed estimation in wireless sensor networks
-
Liu G, Xu B, Chen H. An indicator kriging method for distributed estimation in wireless sensor networks. International Journal of Communication Systems 2014; 27(1):68–80.
-
(2014)
International Journal of Communication Systems
, vol.27
, Issue.1
, pp. 68-80
-
-
Liu, G.1
Xu, B.2
Chen, H.3
-
2
-
-
84896704964
-
TREE: routing strategy with guarantee of QOS for industrial wireless sensor networks
-
Xue L, Guan X, Liu Z, Yang B. TREE: routing strategy with guarantee of QOS for industrial wireless sensor networks. International Journal of Communication Systems 2014; 27(3):459–481.
-
(2014)
International Journal of Communication Systems
, vol.27
, Issue.3
, pp. 459-481
-
-
Xue, L.1
Guan, X.2
Liu, Z.3
Yang, B.4
-
3
-
-
84898807936
-
A hybrid localization and tracking system in camera sensor networks
-
Gao D, Zhu W, Xu X, Chao HC. A hybrid localization and tracking system in camera sensor networks. International Journal of Communication Systems 2014; 27(4):606–622.
-
(2014)
International Journal of Communication Systems
, vol.27
, Issue.4
, pp. 606-622
-
-
Gao, D.1
Zhu, W.2
Xu, X.3
Chao, H.C.4
-
4
-
-
84873044866
-
A fault-tolerant group key agreement protocol exploiting dynamic setting
-
Cheng ZY, Liu Y, Chang CC, Guo C. A fault-tolerant group key agreement protocol exploiting dynamic setting. International Journal of Communication Systems 2013; 26(2):259–275.
-
(2013)
International Journal of Communication Systems
, vol.26
, Issue.2
, pp. 259-275
-
-
Cheng, Z.Y.1
Liu, Y.2
Chang, C.C.3
Guo, C.4
-
5
-
-
84885618675
-
DDRP: an efficient data-driven routing protocol for wireless sensor networks with mobile sinks
-
Shi L, Zhang B, Mouftah HT, Ma J. DDRP: an efficient data-driven routing protocol for wireless sensor networks with mobile sinks. International Journal of Communication Systems 2013; 26(10):1341–1355.
-
(2013)
International Journal of Communication Systems
, vol.26
, Issue.10
, pp. 1341-1355
-
-
Shi, L.1
Zhang, B.2
Mouftah, H.T.3
Ma, J.4
-
6
-
-
84873703641
-
High energy-efficient and privacy-preserving secure data aggregation for wireless sensor networks
-
Liu CX, Liu Y, Zhang ZJ, Cheng ZY. High energy-efficient and privacy-preserving secure data aggregation for wireless sensor networks. International Journal of Communication Systems 2013; 26(3):380–394.
-
(2013)
International Journal of Communication Systems
, vol.26
, Issue.3
, pp. 380-394
-
-
Liu, C.X.1
Liu, Y.2
Zhang, Z.J.3
Cheng, Z.Y.4
-
7
-
-
84883172279
-
Recent issues in wireless sensor networks
-
Chen H, Deng D, Cheng R, Chilamkurti N, Yu Q. Recent issues in wireless sensor networks. International Journal of Communication Systems 2013; 26(9):1089–1091.
-
(2013)
International Journal of Communication Systems
, vol.26
, Issue.9
, pp. 1089-1091
-
-
Chen, H.1
Deng, D.2
Cheng, R.3
Chilamkurti, N.4
Yu, Q.5
-
8
-
-
84881391694
-
Energy-efficient and localized lossy data aggregation in asynchronous sensor networks
-
Zhang J, Shen X, Zeng H, Dai G, Bo C, Chen F, Lv C. Energy-efficient and localized lossy data aggregation in asynchronous sensor networks. International Journal of Communication Systems 2013; 26(8):989–1010.
-
(2013)
International Journal of Communication Systems
, vol.26
, Issue.8
, pp. 989-1010
-
-
Zhang, J.1
Shen, X.2
Zeng, H.3
Dai, G.4
Bo, C.5
Chen, F.6
Lv, C.7
-
9
-
-
84865623128
-
An energy efficient medium access control protocol for target tracking based on dynamic convey tree collaboration in wireless sensor networks
-
Wang Y, Shi P, Li K, Chen Z. An energy efficient medium access control protocol for target tracking based on dynamic convey tree collaboration in wireless sensor networks. International Journal of Communication Systems 2012; 25(9):1139–1159.
-
(2012)
International Journal of Communication Systems
, vol.25
, Issue.9
, pp. 1139-1159
-
-
Wang, Y.1
Shi, P.2
Li, K.3
Chen, Z.4
-
10
-
-
0037086890
-
Wireless sensor networks: a Survey
-
Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor networks: a Survey. Computer Networks 2002; 38(4):393–422.
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
11
-
-
84915759809
-
Analysis formal security verification of access control schemes in wireless sensor networks: a critical survey
-
Chatterjee S, Das AK, Sing JK. Analysis formal security verification of access control schemes in wireless sensor networks: a critical survey. Journal of Information Assurance and Security 2013; 8(1):33–57.
-
(2013)
Journal of Information Assurance and Security
, vol.8
, Issue.1
, pp. 33-57
-
-
Chatterjee, S.1
Das, A.K.2
Sing, J.K.3
-
13
-
-
84858227508
-
A survey on analytic studies of key distribution mechanisms in wireless sensor networks
-
Das AK. A survey on analytic studies of key distribution mechanisms in wireless sensor networks. Journal of Information Assurance and Security 2010; 5(5):526–553.
-
(2010)
Journal of Information Assurance and Security
, vol.5
, Issue.5
, pp. 526-553
-
-
Das, A.K.1
-
15
-
-
84860253312
-
Security and privacy issues in wireless sensor networks for healthcare applications
-
Ameen MA, Liu J, Kwak K. Security and privacy issues in wireless sensor networks for healthcare applications. Journal of Medical Systems 2012; 36(1):93–101.
-
(2012)
Journal of Medical Systems
, vol.36
, Issue.1
, pp. 93-101
-
-
Ameen, M.A.1
Liu, J.2
Kwak, K.3
-
16
-
-
84862762845
-
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
-
Das AK, Sharma P, Chatterjee S, Sing JK. A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. Journal of Network and Computer Applications 2012; 35(5):1646–1656.
-
(2012)
Journal of Network and Computer Applications
, vol.35
, Issue.5
, pp. 1646-1656
-
-
Das, A.K.1
Sharma, P.2
Chatterjee, S.3
Sing, J.K.4
-
17
-
-
78049334450
-
A robust mutual authentication protocol for wireless sensor networks
-
Chen TH, Shih WK. A robust mutual authentication protocol for wireless sensor networks. ETRI Journal 2010; 32(5):704–712.
-
(2010)
ETRI Journal
, vol.32
, Issue.5
, pp. 704-712
-
-
Chen, T.H.1
Shih, W.K.2
-
18
-
-
78650387249
-
A secure and efficient user authentication protocol for two-tieres wireless sensor networks
-
Beijing, China
-
Fan R, Ping LD, Fu JQ, Pan XZ. A secure and efficient user authentication protocol for two-tieres wireless sensor networks. Second Pacific-Asia Conference on Circuits, Communications and System (PACCS 2010), Beijing, China, 2010; 425–428.
-
(2010)
Second Pacific-Asia Conference on Circuits, Communications and System (PACCS 2010)
, pp. 425-428
-
-
Fan, R.1
Ping, L.D.2
Fu, J.Q.3
Pan, X.Z.4
-
19
-
-
78650459565
-
An enhanced two-factor user authentication scheme in wireless sensor networks
-
He D, Gao Y, Chan S, Chen C, Bu J. An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc & Sensor Wireless Networks 2010; 10(4):361–371.
-
(2010)
Ad Hoc & Sensor Wireless Networks
, vol.10
, Issue.4
, pp. 361-371
-
-
He, D.1
Gao, Y.2
Chan, S.3
Chen, C.4
Bu, J.5
-
20
-
-
77955495427
-
Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks
-
Khan MK, Alghathbar K. Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors 2010; 10:2450–2459.
-
(2010)
Sensors
, vol.10
, pp. 2450-2459
-
-
Khan, M.K.1
Alghathbar, K.2
-
21
-
-
79953085274
-
Two attacks on a two-factor user authentication in wireless sensor networks
-
Lee CC, Li CT, Chen SD. Two attacks on a two-factor user authentication in wireless sensor networks. Parallel Processing Letters 2011; 21(1):21–26.
-
(2011)
Parallel Processing Letters
, vol.21
, Issue.1
, pp. 21-26
-
-
Lee, C.C.1
Li, C.T.2
Chen, S.D.3
-
22
-
-
78650750082
-
Improved two-factor user authentication in wireless sensor networks
-
Niagara Falls, ON, Canada
-
Vaidya B, Makrakis D, Mouftah HT. Improved two-factor user authentication in wireless sensor networks. Second International Workshop on Network Assurance and Security Services in Ubiquitous Environments, Niagara Falls, ON, Canada, 2010; 600–606.
-
(2010)
Second International Workshop on Network Assurance and Security Services in Ubiquitous Environments
, pp. 600-606
-
-
Vaidya, B.1
Makrakis, D.2
Mouftah, H.T.3
-
23
-
-
33845458336
-
A dynamic user authentication scheme for wireless sensor networks
-
Taichung, Taiwan
-
Wong K, Zheng Y, Cao J, Wang S. A dynamic user authentication scheme for wireless sensor networks. Proceedings of IEEE International Conference on Sensor Networks, Ubiquitous, Trustworthy Computing, 1, Taichung, Taiwan, 2006; 244–251.
-
(2006)
Proceedings of IEEE International Conference on Sensor Networks, Ubiquitous, Trustworthy Computing
, vol.1
, pp. 244-251
-
-
Wong, K.1
Zheng, Y.2
Cao, J.3
Wang, S.4
-
24
-
-
84891619186
-
Formal security verification of a dynamic password-based user authentication scheme for hierarchical wireless sensor networks
-
Mysore, India
-
Das AK, Chatterjee S, Sing JK. Formal security verification of a dynamic password-based user authentication scheme for hierarchical wireless sensor networks. International Symposium on Security in Computing and Communications (SSCC 2013), Communications in Computer and Information Science Series (CCIS), Vol. 377, Mysore, India, 2013; 243–254.
-
(2013)
International Symposium on Security in Computing and Communications (SSCC 2013), Communications in Computer and Information Science Series (CCIS)
, vol.377
, pp. 243-254
-
-
Das, A.K.1
Chatterjee, S.2
Sing, J.K.3
-
25
-
-
84901198272
-
Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
-
In Press. [Accessed on April 2014]
-
Wang D, Wang P. Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks. Ad Hoc Networks 2014; 20: 1–15. In Press. Available from: http://dx.doi.org/10.1016/j.adhoc.2014.03.003 [Accessed on April 2014]
-
(2014)
Ad Hoc Networks
, vol.20
, pp. 1-15
-
-
Wang, D.1
Wang, P.2
-
27
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
Das ML. Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications 2009; 8(3):1086–1090.
-
(2009)
IEEE Transactions on Wireless Communications
, vol.8
, Issue.3
, pp. 1086-1090
-
-
Das, M.L.1
-
28
-
-
84941217626
-
A new biometric-based remote user authentication scheme in hierarchical wireless body area sensor networks
-
In Press
-
Das AK, Chatterjee S, Sing JK. A new biometric-based remote user authentication scheme in hierarchical wireless body area sensor networks. Ad Hoc & Sensor Wireless Networks 2014. In Press.
-
(2014)
Ad Hoc & Sensor Wireless Networks
-
-
Das, A.K.1
Chatterjee, S.2
Sing, J.K.3
-
29
-
-
84878645187
-
An efficient biometric authentication protocol for wireless sensor networks
-
[Accessed on April 2013]
-
Althobaiti O, Al-Rodhaan M, Al-Dhelaan A. An efficient biometric authentication protocol for wireless sensor networks. International Journal of Distributed Sensor Networks 2013; 2013:1–13. Article ID 407971, Available from: http://dx.doi.org/10.1155/2013/407971 [Accessed on April 2013].
-
(2013)
International Journal of Distributed Sensor Networks
, vol.2013
, pp. 1-13
-
-
Althobaiti, O.1
Al-Rodhaan, M.2
Al-Dhelaan, A.3
-
30
-
-
84927623620
-
Cryptanalysis of an efficient biometric authentication protocol for wireless sensor networks
-
In, Mauri J, Thampi S, Rawat D, Jin D, (eds)., Springer, Berlin, Heidelberg, [Accessed on September 2014]
-
Das AK. Cryptanalysis of an efficient biometric authentication protocol for wireless sensor networks. In Security in Computing and Communications, Communications in Computer and Information Science, Vol. 467, Mauri J, Thampi S, Rawat D, Jin D (eds). Springer: Berlin, Heidelberg, 2014; 1–9. Available from: http://dx.doi.org/10.1007/978-3-662-44966-0_{1} [Accessed on September 2014].
-
(2014)
Security in Computing and Communications, Communications in Computer and Information Science
, vol.467
, pp. 1-9
-
-
Das, A.K.1
-
31
-
-
84881444249
-
A biometric-based user authentication scheme for heterogeneous wireless sensor networks
-
WAINA 2013, Barcelona, Spain
-
Das AK, Bruhadeshwar B. A biometric-based user authentication scheme for heterogeneous wireless sensor networks. 27th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2013, Barcelona, Spain, 2013; 291–296.
-
(2013)
27th International Conference on Advanced Information Networking and Applications Workshops
, pp. 291-296
-
-
Das, A.K.1
Bruhadeshwar, B.2
-
32
-
-
84953352636
-
A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks
-
[Accessed on August 2013]
-
Das AK. A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer-to-Peer Networking and Applications 2014; 1–22. Available from: http://dx.doi.org/10.1007/s12083-014-0324-9 [Accessed on August 2013].
-
(2014)
Peer-to-Peer Networking and Applications
, pp. 1-22
-
-
Das, A.K.1
-
33
-
-
84893726389
-
A secure temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
-
Taipei, Taiwan
-
He D, Kumar N, Chilamkurti N. A secure temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. International Symposium on Wireless and Pervasive Computing (ISWPC 2013), Taipei, Taiwan, 2013; 1–6.
-
(2013)
International Symposium on Wireless and Pervasive Computing (ISWPC 2013)
, pp. 1-6
-
-
He, D.1
Kumar, N.2
Chilamkurti, N.3
-
34
-
-
84877090869
-
A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care
-
Das AK, Goswami A. A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. Journal of Medical Systems 2013; 37(3):1–16.
-
(2013)
Journal of Medical Systems
, vol.37
, Issue.3
, pp. 1-16
-
-
Das, A.K.1
Goswami, A.2
-
35
-
-
78651389846
-
A simple and generic construction of authenticated encryption with associated data
-
Sarkar P. A simple and generic construction of authenticated encryption with associated data. ACM Transactions on Information and System Security 2010; 13(4):33.
-
(2010)
ACM Transactions on Information and System Security
, vol.13
, Issue.4
, pp. 33
-
-
Sarkar, P.1
-
36
-
-
30744432873
-
Some observations on the theory of cryptographic hash functions
-
Stinson DR. Some observations on the theory of cryptographic hash functions. Designs, Codes and Cryptography 2006; 38(2):259–277.
-
(2006)
Designs, Codes and Cryptography
, vol.38
, Issue.2
, pp. 259-277
-
-
Stinson, D.R.1
-
37
-
-
84897055589
-
A secure effective key management scheme for dynamic access control in a large leaf class hierarchy
-
Odelu V, Das AK, Goswami A. A secure effective key management scheme for dynamic access control in a large leaf class hierarchy. Information Sciences 2014; 269(C):270–285.
-
(2014)
Information Sciences
, vol.269
, Issue.C
, pp. 270-285
-
-
Odelu, V.1
Das, A.K.2
Goswami, A.3
-
38
-
-
84873031582
-
An efficient key-management scheme for hierarchical access control in e-medicine system
-
Wu S, Chen K. An efficient key-management scheme for hierarchical access control in e-medicine system. Journal of Medical Systems 2012; 36(4):2325–2337.
-
(2012)
Journal of Medical Systems
, vol.36
, Issue.4
, pp. 2325-2337
-
-
Wu, S.1
Chen, K.2
-
39
-
-
38149029815
-
A biometric identity based signature scheme
-
Burnett A, Byrne F, Dowling T, Duffy A. A biometric identity based signature scheme. International Journal of Network Security 2007; 5(3):317–326.
-
(2007)
International Journal of Network Security
, vol.5
, Issue.3
, pp. 317-326
-
-
Burnett, A.1
Byrne, F.2
Dowling, T.3
Duffy, A.4
-
40
-
-
35048865463
-
Fuzzy extractors: how to generate strong keys from biometrics and other noisy data
-
Interlaken, Switzerland
-
Dodis Y, Reyzin L, Smith A. Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. Proceedings of the Advances in Cryptology (Eurocrypt'04), LNCS, Vol. 3027, Interlaken, Switzerland, 2004; 523–540.
-
(2004)
Proceedings of the Advances in Cryptology (Eurocrypt'04), LNCS
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
41
-
-
84898048082
-
Enhanced three-factor security protocol for consumer USB mass storage devices
-
He D, Kumar N, Lee JH, Sherratt RS. Enhanced three-factor security protocol for consumer USB mass storage devices. IEEE Transactions on Consumer Electronics 2014; 60(1):30–37.
-
(2014)
IEEE Transactions on Consumer Electronics
, vol.60
, Issue.1
, pp. 30-37
-
-
He, D.1
Kumar, N.2
Lee, J.H.3
Sherratt, R.S.4
-
42
-
-
0009504774
-
-
National Institute of Standards and Technology (NIST), U.S. Department of Commerce
-
Standard SH. FIPS PUB 180-1,National Institute of Standards and Technology (NIST), U.S. Department of Commerce, 1995.
-
(1995)
FIPS PUB 180-1
-
-
-
43
-
-
84939573910
-
Differential power analysis
-
Santa Barbara, California, USA
-
Kocher P, Jaffe J, Jun B. Differential power analysis. Proceedings of Advances in Cryptology - CRYPTO'99, LNCS, Vol. 1666, Santa Barbara, California, USA, 1999; 388–397.
-
(1999)
Proceedings of Advances in Cryptology - CRYPTO'99, LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
44
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
Messerges TS, Dabbish EA, Sloan RH. Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers 2002; 51(5):541–552.
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
46
-
-
77954920932
-
An efficient dynamic group key agreement protocol for imbalanced wireless networks
-
Chuang YH, Tseng YM. An efficient dynamic group key agreement protocol for imbalanced wireless networks. International Journal of Network Management 2010; 20(4):167–180.
-
(2010)
International Journal of Network Management
, vol.20
, Issue.4
, pp. 167-180
-
-
Chuang, Y.H.1
Tseng, Y.M.2
-
47
-
-
26444497860
-
The avispa tool for the automated validation of internet security protocols and applications
-
Springer-Verlag, Edinburgh, Scotland, UK
-
Armando A, Basin D, Boichut Y, Chevalier Y, Compagna L, Cuellar J, Drielsma PH, Heám PC, Kouchnarenko O, Mantovani J, Mödersheim S, von Oheimb D, Rusinowitch M, Santiago J, Turuani M, Viganò L, Vigneron L. The avispa tool for the automated validation of internet security protocols and applications. In 17th International Conference on Computer Aided Verification (CAV'05), vol. 3576, Lecture Notes in Computer Science. Springer-Verlag: Edinburgh, Scotland, UK, 2005; 281–285.
-
(2005)
17th International Conference on Computer Aided Verification (CAV'05), In, Lecture Notes in Computer Science
, vol.3576
, pp. 281-285
-
-
Armando, A.1
Basin, D.2
Boichut, Y.3
Chevalier, Y.4
Compagna, L.5
Cuellar, J.6
Drielsma, P.H.7
Heám, P.C.8
Kouchnarenko, O.9
Mantovani, J.10
Mödersheim, S.11
von Oheimb, D.12
Rusinowitch, M.13
Santiago, J.14
Turuani, M.15
Viganò, L.16
Vigneron, L.17
-
49
-
-
70349371604
-
The high-level protocol specification language HLPSL developed in the EU project avispa
-
Tallinn
-
von Oheimb D. The high-level protocol specification language HLPSL developed in the EU project avispa. Proceedings of APPSEM 2005 Workshop, Tallinn, 2005; 1–17.
-
(2005)
Proceedings of APPSEM 2005 Workshop
, pp. 1-17
-
-
von Oheimb, D.1
-
51
-
-
84877723487
-
-
[Accessed on July 2014]
-
AVISPA Web Tool. Available from: http://www.avispa-project.org/web-interface/expert.php/ [Accessed on July 2014].
-
AVISPA Web Tool
-
-
-
52
-
-
84863637154
-
A security-performance-balanced user authentication scheme for wireless sensor networks
-
Yoo SG, Park KY, Kim J. A security-performance-balanced user authentication scheme for wireless sensor networks. International Journal of Distributed Sensor Networks 2012; 2012:11. Article ID 382810, DOI: 10.1155/2012/382810.
-
(2012)
International Journal of Distributed Sensor Networks
, vol.2012
, pp. 11
-
-
Yoo, S.G.1
Park, K.Y.2
Kim, J.3
-
53
-
-
84883446358
-
On the security and improvement of a two-factor user authentication scheme in wireless sensor networks
-
Sun DZ, Li JX, Feng ZY, Cao ZF, Xu GQ. On the security and improvement of a two-factor user authentication scheme in wireless sensor networks. Personal and Ubiquitous Computing 2013; 17(5):895–905.
-
(2013)
Personal and Ubiquitous Computing
, vol.17
, Issue.5
, pp. 895-905
-
-
Sun, D.Z.1
Li, J.X.2
Feng, Z.Y.3
Cao, Z.F.4
Xu, G.Q.5
-
54
-
-
84870693016
-
A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
-
Xue K, Ma C, Hong P, Ding R. A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Journal of Network and Computer Applications 2013; 36(1):316–323.
-
(2013)
Journal of Network and Computer Applications
, vol.36
, Issue.1
, pp. 316-323
-
-
Xue, K.1
Ma, C.2
Hong, P.3
Ding, R.4
-
55
-
-
84939576175
-
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
-
Jiang Q, Ma J, Lu X, Tian Y. An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Networking and Applications 2014; 1–12. DOI: 10.1007/s12083-014-0285-z.
-
(2014)
Peer-to-Peer Networking and Applications
, pp. 1-12
-
-
Jiang, Q.1
Ma, J.2
Lu, X.3
Tian, Y.4
|