Citation to this article as recorded by
Wang, X., Y. Liu and H. Yang, 2012. An anonymous authentication scheme based on fully homomorphic encryption in P2P networks. Inform. Technol. J., 11: 613-619. CrossRefDirect Link |
Wang, X.l., J. Zhang and H.Z. Yang, 2012. Research and improvement of unstructured P2P super-peer topology and search technique. Inform. Technol. J., 11: 1400-1408. CrossRefDirect Link |
Xu, Z.J., S.Q. Chu, Y. Wu and L.M. Meng, 2013. An improved TFRC scheme for wired/wireless hybrid networks. Inform. Technol. J., 12: 168-173. CrossRefDirect Link |
Ye, L., H. Zhang and Q. Dai, 2011. Identifying P2P application with DHT behaviors. Inform. Technol. J., 10: 565-572. CrossRefDirect Link |
Citation to this article as recorded by
Identifying P2P application with DHT behaviors. Information Technology Journal Vol. 10, Issue 3, 565, 2011 |
An Anonymous Authentication Scheme Based on Fully Homomorphic Encryption in P2P Networks Information Technology Journal Vol. 11, Issue 5, 613, 2012 |
How to cite this article
Ting Peng and Qinghua Zheng, 2010. Resource Occupation of Peer-to-Peer Multicasting. Information Technology Journal, 9: 438-445.
DOI: 10.3923/itj.2010.438.445
URL: https://scialert.net/abstract/?doi=itj.2010.438.445
DOI: 10.3923/itj.2010.438.445
URL: https://scialert.net/abstract/?doi=itj.2010.438.445