Author of the publication

A New Authentication Method with Distributed Hash Table for P2P Network.

, , , , , and . AINA Workshops, page 483-488. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SwGridNet: A Deep Convolutional Neural Network based on Grid Topology for Image Classification.. CoRR, (2017)A Proposal of Privacy Management Architecture., , , , , and . SAINT, page 161-164. IEEE Computer Society, (2010)Scalable and Accurate Data Aggregation Mechanism on Structured P2P Network., , , and . BWCCA, page 389-394. IEEE Computer Society, (2014)Detection and Analysis of Intrusion Attacks Using Deep Neural Networks.. NBiS, volume 526 of Lecture Notes in Networks and Systems, page 258-266. Springer, (2022)A New Authentication Method with Distributed Hash Table for P2P Network., , , , , and . AINA Workshops, page 483-488. IEEE Computer Society, (2008)A Fair Load Sharing Scheme for Multi-source Multimedia Overlay Application Layer Multicast., , , , , , and . CISIS, page 337-344. IEEE Computer Society, (2010)SS5 design of a P2P information sharing system and its application to communication support in natural disaster., , , and . ICCI*CC, page 118-125. IEEE Computer Society, (2013)A Simple Deep Learning Approach for Intrusion Detection System., and . ICMU, page 1-2. IEEE, (2021)An Overlay Authentication Network for Active Utilization of Private Information., , , , , , and . SAINT, page 185-188. IEEE Computer Society, (2010)Visitor Access Control Scheme Utilizing Social Relationship in the Real World., , , , , and . IFIPTM, volume 321 of IFIP Advances in Information and Communication Technology, page 95-107. Springer, (2010)