{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,29]],"date-time":"2023-09-29T20:21:14Z","timestamp":1696018874400},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2014,4,24]],"date-time":"2014-04-24T00:00:00Z","timestamp":1398297600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1007\/s12083-014-0274-2","type":"journal-article","created":{"date-parts":[[2014,4,23]],"date-time":"2014-04-23T06:58:37Z","timestamp":1398236317000},"page":"587-595","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Key exchange process of PIM-SM-based for Multiple Group Communication in P2P"],"prefix":"10.1007","volume":"8","author":[{"given":"Si-Jung","family":"Kim","sequence":"first","affiliation":[]},{"given":"Bong-Han","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,4,24]]},"reference":[{"key":"274_CR1","unstructured":"Wi-Fi Alliance (2010) Wi-Fi certified Wi-Fi direct. White paper"},{"key":"274_CR2","unstructured":"Wi-Fi Alliance (2010) Wi-Fi peer-to-peer(P2P) technical specification version 1.1"},{"key":"274_CR3","unstructured":"Wi-Fi Alliance (2011) Wi-Fi simple configuration protocol and usability best practices for the Wi-Fi protected setup program version 2.0.1"},{"key":"274_CR4","unstructured":"ISO\/IEC 20002 (2012) Managed P2P: framework"},{"key":"274_CR5","unstructured":"ISO\/IEC JTC1\/SC6, 6N15355 (2012) Proposed NP text on functional architecture and protocols for managed P2P communications"},{"key":"274_CR6","doi-asserted-by":"crossref","unstructured":"El-Ansary S, Haridi S (2005) An overview of structured P2P overlay networks. IEEE Commun Surv Tutor","DOI":"10.1201\/9780203323687.ch39"},{"key":"274_CR7","unstructured":"Lua EK, Crowcroft J, Pias M, Sharma R, Lim S (2004) A survey and comparison of peer-to-peer overlay network schemes. IEEE Commun Surv Tutor 7(2):72\u201393"},{"key":"274_CR8","unstructured":"Vishnumurthy V, Francis P (2007) A comparison of structured and unstructured P2P approaches to heterogeneous random peer selection. 2007 USENIX Annual Technical Conference, pp 309\u2013322"},{"key":"274_CR9","doi-asserted-by":"crossref","unstructured":"Shin W, Rhee K-H (2012) Risk analysis on vulnerabilities and threats for domestic P2P service environments. J Korea Inf Commun Soc 16(7):7447\u20137454","DOI":"10.6109\/jkiice.2012.16.7.1447"},{"key":"274_CR10","unstructured":"Lee S-H (2009) A design of mobile agent support system in hybrid P2P environment"},{"key":"274_CR11","doi-asserted-by":"crossref","unstructured":"He H, Li R, Xu Z, Xiao W (2013) An efficient ECC-based mechanism for securing network coding-based P2P content distribution. Peer-to-Peer Netw Appl. doi: 10.1007\/s12083-013-0239-x","DOI":"10.1007\/s12083-013-0239-x"},{"issue":"4","key":"274_CR12","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1007\/s12083-012-0159-1","volume":"5","author":"C H\u00fcbsch","year":"2012","unstructured":"H\u00fcbsch C, Waldhorst OP, Hock M (2012) Distributed WiFi detection and integration in dense urban mobile Peer-to-Peer networks. Peer-to-Peer Netw Appl 5(4):323\u2013339","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"1","key":"274_CR13","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/s12083-012-0129-7","volume":"6","author":"S Wu","year":"2013","unstructured":"Wu S, Pu Q, Kang F (2013) Practical authentication scheme for SIP. Peer-to-Peer Netw Appl 6(1):61\u201374","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"3","key":"274_CR14","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1016\/j.comcom.2009.10.005","volume":"33","author":"Y-P Liaoa","year":"2010","unstructured":"Liaoa Y-P, Wanga S-S (2010) A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves. Comput Commun 33(3):372\u2013380","journal-title":"Comput Commun"},{"key":"274_CR15","unstructured":"Kong J, Cai W, Wang L, Zhao Q (2010) A study of pollution on BitTorrent. Proc. The 2nd International Conference on Computer and Automation Engineering, Singapore"},{"issue":"9","key":"274_CR16","doi-asserted-by":"crossref","first-page":"1702","DOI":"10.1016\/j.ins.2010.01.005","volume":"180","author":"T-F Lee","year":"2010","unstructured":"Lee T-F, Hwanga T (2010) Simple password-based three-party authenticated key exchange without server public keys. Inf Sci 180(9):1702\u20131714","journal-title":"Inf Sci"},{"issue":"4","key":"274_CR17","doi-asserted-by":"crossref","first-page":"532","DOI":"10.1002\/dac.1168","volume":"24","author":"E-J Yoon","year":"2011","unstructured":"Yoon E-J, Yoo K-Y (2011) Cryptanalysis of a simple three-party password-based key exchange protocol. Int J Commun Syst 24(4):532\u2013542","journal-title":"Int J Commun Syst"},{"key":"274_CR18","doi-asserted-by":"crossref","unstructured":"Magharei N, Rejaie R (2007) Peer-to-peer receiver-driven mesh-based streaming. IEEE INFOCOM 2007","DOI":"10.1109\/INFCOM.2007.167"},{"issue":"3","key":"274_CR19","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1007\/s12083-009-0050-x","volume":"3","author":"M Zhang","year":"2010","unstructured":"Zhang M, Sun L, Fang Y, Yang S (2010) The system to provide low delay peer-to-peer live streaming service over internet. Peer-to-Peer Netw Appl 3(3):175\u2013185","journal-title":"Peer-to-Peer Netw Appl"},{"key":"274_CR20","first-page":"2102","volume":"3","author":"X Zhang","year":"2005","unstructured":"Zhang X, Liu J, Li B, Yum T-SP (2005) A data-driven overlay network for peer-to-peer live media streaming. IEEE Conf Comput Commun (INFOCOM) 3:2102\u20132111","journal-title":"IEEE Conf Comput Commun (INFOCOM)"},{"key":"274_CR21","unstructured":"Jia D, Yee WG, Nguyen LT (2008) Ophir Frieder. Distributed, automatic file descriptor tuning in P2P file-sharing systems. Vol. 1, Issue 2, pp 148\u2013161"},{"key":"274_CR22","unstructured":"Cuenca-Acuna FM, Nguyen TD (2005) Text-based content search and retrieval in ad hoc P2P communities. In Proc. Intl. Workshop Peer-to-Peer Comp. Springer, London, pp 220\u2013234"},{"key":"274_CR23","doi-asserted-by":"crossref","unstructured":"Yee WG, Nguyen LT, Frieder O (2007) Masked queries for search accuracy in peer-to-peer file-sharing systems. In Parallel and distributed processing symposium, IPDPS 2007. IEEE International, pp. 1\u201310","DOI":"10.1109\/IPDPS.2007.370269"},{"issue":"2","key":"274_CR24","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1007\/s12083-008-0010-x","volume":"1","author":"N Sarshar","year":"2008","unstructured":"Sarshar N, Roychowdhury VP (2008) SUPNET: an end-to-end solution to scalable unstructured P2P networking. Peer-to-Peer Netw Applic 1(2):122\u2013138","journal-title":"Peer-to-Peer Netw Applic"},{"issue":"1","key":"274_CR25","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1007\/s12083-009-0058-2","volume":"3","author":"C Doulkeridis","year":"2010","unstructured":"Doulkeridis C, Vlachou A, N\u00f8rv\u00e5g K, Kotidis Y, Vazirgiannis M (2010) 79 Efficient search based on content similarity over self-organizing P2P networks. Peer-to-Peer Netw Applic 3(1):67\u201379","journal-title":"Peer-to-Peer Netw Applic"},{"key":"274_CR26","doi-asserted-by":"crossref","unstructured":"Karagiannis T, Broido A, Faloutsos M, Claffy Kc (2004) Transport layer identification of P2P traffic. In: Proceedings of IMC, pp 121\u201313","DOI":"10.1145\/1028788.1028804"},{"issue":"1","key":"274_CR27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s12083-010-0095-x","volume":"4","author":"M Song","year":"2011","unstructured":"Song M, Shetty S, Jiang W, Park EK (2011) Special issue on information dissemination and new services in P2P systems. Peer-to-Peer Netw Appl 4(1):1\u20132","journal-title":"Peer-to-Peer Netw Appl"},{"key":"274_CR28","unstructured":"Holbrook H, Handley M, Holbrook H, Kouvelas I (2006) Protocol independent multicast sparse mode (PIM-SM): protocol specification (Revised). RFC 4601, http:\/\/www.rfc-editor.org\/pdfrfc\/rfc4601.txt.pdf"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-014-0274-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-014-0274-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-014-0274-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T04:08:29Z","timestamp":1648872509000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-014-0274-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,24]]},"references-count":28,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,7]]}},"alternative-id":["274"],"URL":"https:\/\/doi.org\/10.1007\/s12083-014-0274-2","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,4,24]]}}}