{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T00:06:46Z","timestamp":1773187606746,"version":"3.50.1"},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,2,21]],"date-time":"2020-02-21T00:00:00Z","timestamp":1582243200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,2,21]],"date-time":"2020-02-21T00:00:00Z","timestamp":1582243200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1007\/s12083-020-00887-5","type":"journal-article","created":{"date-parts":[[2020,2,21]],"date-time":"2020-02-21T06:02:59Z","timestamp":1582264979000},"page":"575-578","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["P2P computing for intelligence of things"],"prefix":"10.1007","volume":"13","author":[{"given":"Sunmoon","family":"Jo","sequence":"first","affiliation":[]},{"given":"Jieun","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Jungsoo","family":"Han","sequence":"additional","affiliation":[]},{"given":"Supratip","family":"Ghose","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,21]]},"reference":[{"key":"887_CR1","doi-asserted-by":"publisher","unstructured":"Kim DY, Lee A, Kim S (2019) P2P computing for trusted networking of personalized IoT services. Peer-to-Peer Networking and Applications:1\u20139. https:\/\/doi.org\/10.1007\/s12083-019-00737-z","DOI":"10.1007\/s12083-019-00737-z"},{"key":"887_CR2","doi-asserted-by":"publisher","first-page":"1166","DOI":"10.1007\/s12083-017-0606-0","volume":"11","author":"D Han","year":"2019","unstructured":"Han D, Cho M (2019) Selective switching dual-transmission scheme in multi-LED hybrid VLC-P2P networking system. Peer-to-Peer Networking and Applications 11:1166\u20131175. https:\/\/doi.org\/10.1007\/s12083-017-0606-0","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"887_CR3","doi-asserted-by":"publisher","unstructured":"Lee YJ, Lee KM, Lee SH (2019) Blockchain-based reputation management for custom manufacturing service in the peer-to-peer networking environment. Peer-to-Peer Networking and Applications:1\u201313. https:\/\/doi.org\/10.1007\/s12083-019-00730-6","DOI":"10.1007\/s12083-019-00730-6"},{"key":"887_CR4","doi-asserted-by":"publisher","unstructured":"Noor Alleema N, Siva Kumar D (2019) Volunteer nodes of ant colony optimization routing for minimizing delay in peer to peer MANETs. Peer-to-Peer Networking and Applications:1\u201311. https:\/\/doi.org\/10.1007\/s12083-019-00772-w","DOI":"10.1007\/s12083-019-00772-w"},{"key":"887_CR5","doi-asserted-by":"publisher","unstructured":"Uma Maheswari P, Ganeshbabu TR (2019) Repetitive node categorization technique based reliable clustering and energy efficient communication in P2P wireless sensor network. Peer-to-Peer Networking and Applications. https:\/\/doi.org\/10.1007\/s12083-019-00768-6","DOI":"10.1007\/s12083-019-00768-6"},{"key":"887_CR6","doi-asserted-by":"publisher","unstructured":"Park S, Cha BR, Chung K, Kim JW (2019) Mobile IoT device summarizer using P2P web search engine and inherent characteristic of contents. Peer-to-Peer Networking and Applications:1\u201310. https:\/\/doi.org\/10.1007\/s12083-019-00780-w","DOI":"10.1007\/s12083-019-00780-w"},{"key":"887_CR7","doi-asserted-by":"publisher","unstructured":"Hong S (2019) P2P networking based internet of things (IoT) sensor node authentication by Blockchain. Peer-to-Peer Networking and Applications:1\u201311. https:\/\/doi.org\/10.1007\/s12083-019-00739-x","DOI":"10.1007\/s12083-019-00739-x"},{"key":"887_CR8","doi-asserted-by":"publisher","unstructured":"Chung K, Park RC (2019) P2P-based open health cloud for medicine management. Peer-to-Peer Networking and Applications:1\u201313. https:\/\/doi.org\/10.1007\/s12083-019-00791-7","DOI":"10.1007\/s12083-019-00791-7"},{"key":"887_CR9","doi-asserted-by":"publisher","unstructured":"Shin J, Islam MR, Rhaim MA, Mun HJ (2019) Arm movement activity based user authentication in P2P systems. Peer-to-Peer Networking and Applications. https:\/\/doi.org\/10.1007\/s12083-019-00775-7","DOI":"10.1007\/s12083-019-00775-7"},{"key":"887_CR10","doi-asserted-by":"publisher","unstructured":"Priya B, Gnanasekaran T (2019) To optimize load of hybrid P2P cloud data-center using efficient load optimization and resource minimization algorithm. Peer-to-Peer Networking and Applications:1\u201312. https:\/\/doi.org\/10.1007\/s12083-019-00795-3","DOI":"10.1007\/s12083-019-00795-3"},{"key":"887_CR11","doi-asserted-by":"publisher","unstructured":"Chung K, Yoo H (2019) Edge computing health model using P2P-based deep neural networks. Peer-to-Peer Networking and Applications:1\u201310. https:\/\/doi.org\/10.1007\/s12083-019-00738-y","DOI":"10.1007\/s12083-019-00738-y"},{"key":"887_CR12","doi-asserted-by":"publisher","unstructured":"Kim YY, Kim YK, Kim DS, Kim MH (2019) Implementation of hybrid P2P networking distributed web crawler using AWS for smart work news big data. Peer-to-Peer Networking and Applications:1\u201312. https:\/\/doi.org\/10.1007\/s12083-019-00841-0","DOI":"10.1007\/s12083-019-00841-0"},{"key":"887_CR13","doi-asserted-by":"publisher","unstructured":"Tien M, Park YY, Jung KH, Kim SY, Kye JE (2019) Performance evaluation on the accuracy of the semantic map of an autonomous robot equipped with P2P communication module. Peer-to-Peer Networking and Applications:1\u201313. https:\/\/doi.org\/10.1007\/s12083-019-00851-y","DOI":"10.1007\/s12083-019-00851-y"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-020-00887-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-020-00887-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-020-00887-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,20]],"date-time":"2021-02-20T02:18:45Z","timestamp":1613787525000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-020-00887-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,21]]},"references-count":13,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,3]]}},"alternative-id":["887"],"URL":"https:\/\/doi.org\/10.1007\/s12083-020-00887-5","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2,21]]},"assertion":[{"value":"21 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}