From post

Security Clustering: A Network-Wide Secure Computing Mechanism in Pervasive Computing.

, , , , и . NETWORKING, том 3042 из Lecture Notes in Computer Science, стр. 1326-1331. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Antibody Layer for Internet security., , , и . GLOBECOM, стр. 450-454. IEEE, (2000)New Adaptive Trust Models against DDoS: Back-Up CA and Mesh PKI., , , , , и . Human.Society@Internet 2003, том 2713 из Lecture Notes in Computer Science, стр. 731-737. Springer, (2003)Volitional EMG Controlled Wearable FES System for Lower Limb Rehabilitation., , , , , и . EMBC, стр. 7099-7102. IEEE, (2021)A PKI-Based Authentication Framework for Next Generation Mobile Internet., , , и . Human.Society@Internet 2003, том 2713 из Lecture Notes in Computer Science, стр. 34-43. Springer, (2003)Performance Prediction in Peer-to-Peer MultiAgent Networks., , , , и . AP2PC, том 5319 из Lecture Notes in Computer Science, стр. 27-40. Springer, (2007)Random Visitor: A Defense Against Identity Attacks in P2P Overlay Networks., , , , и . WISA, том 4298 из Lecture Notes in Computer Science, стр. 282-296. Springer, (2006)Security Clustering: A Network-Wide Secure Computing Mechanism in Pervasive Computing., , , , и . NETWORKING, том 3042 из Lecture Notes in Computer Science, стр. 1326-1331. Springer, (2004)Mobile PKI: A PKI-Based Authentication Framework for the Next Generation Mobile Communications., , , , , и . ACISP, том 2727 из Lecture Notes in Computer Science, стр. 180-191. Springer, (2003)