Citation to this article as recorded by
Wang, X., Y. Liu and H. Yang, 2012. An anonymous authentication scheme based on fully homomorphic encryption in P2P networks. Inform. Technol. J., 11: 613-619. CrossRefDirect Link |
Wang, X.l., J. Zhang and H.Z. Yang, 2012. Research and improvement of unstructured P2P super-peer topology and search technique. Inform. Technol. J., 11: 1400-1408. CrossRefDirect Link |
Citation to this article as recorded by
An Anonymous Authentication Scheme Based on Fully Homomorphic Encryption in P2P Networks Information Technology Journal Vol. 11, Issue 5, 613, 2012 |
How to cite this article
Lin Ye, Hongli Zhang and Qiang Dai, 2011. Identifying P2P Application with DHT Behaviors. Information Technology Journal, 10: 565-572.
DOI: 10.3923/itj.2011.565.572
URL: https://scialert.net/abstract/?doi=itj.2011.565.572
DOI: 10.3923/itj.2011.565.572
URL: https://scialert.net/abstract/?doi=itj.2011.565.572