From post

Building a Secure Infrastructure for P2P Applications in Mobile Ad Hoc Networks.

, , , и . GCC Workshops, том 3252 из Lecture Notes in Computer Science, стр. 398-405. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Building a Secure Infrastructure for P2P Applications in Mobile Ad Hoc Networks., , , и . GCC Workshops, том 3252 из Lecture Notes in Computer Science, стр. 398-405. Springer, (2004)The REESSE2+ Public-key Encryption Scheme - Another Application of the Lever Function and its Connotation, , и . CoRR, (2008)A Scalable Peer-to-Peer Lookup Model., , , , и . GCC (1), том 3032 из Lecture Notes in Computer Science, стр. 379-387. Springer, (2003)Efficient Content Locating in Peer-to-Peer Systems., , и . ICEBE, стр. 253-257. IEEE Computer Society, (2005)Researches on Scalable Architecture for Security Information Distribution Service., , , , и . GCC Workshops, том 3252 из Lecture Notes in Computer Science, стр. 450-457. Springer, (2004)Optimizing Cauchy Reed-Solomon Codes for P2P Storage Cloud., , и . WASA, том 7405 из Lecture Notes in Computer Science, стр. 378-385. Springer, (2012)Secure Data Transmission on Multiple Paths in Mobile Ad Hoc Networks., , и . WASA, том 4138 из Lecture Notes in Computer Science, стр. 424-434. Springer, (2006)Performance Analysis of the HLLACF., , , , и . ICYCS, стр. 2120-2124. IEEE Computer Society, (2008)Parallel Downloading Algorithm for Large-volume File Distribution., , и . PDCAT, стр. 745-749. IEEE Computer Society, (2005)An Efficient Distributed Search Method., , и . HPCC, том 3726 из Lecture Notes in Computer Science, стр. 265-270. Springer, (2005)