Author of the publication

A New Authentication Method with Distributed Hash Table for P2P Network.

, , , , , and . AINA Workshops, page 483-488. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Effective Multi-UAVs-Based Evacuation Guidance Support for Disaster Risk Reduction., , , , , and . BigComp, page 1-6. IEEE, (2019)An Agent-Based Intelligent Data Presentation Mechanism for Multifaceted Analysis., , , , and . CISIS, volume 993 of Advances in Intelligent Systems and Computing, page 587-595. Springer, (2019)Improving per-flow fairness by ML-based estimation of competing flows' congestion control algorithm., , and . ICUFN, page 376-381. IEEE, (2022)Knowledge Oriented Network Fault Resolution Method Based on Active Information Resource., , , , , , , , and . IAT, page 361-364. IEEE Computer Society Press, (2010)978-0-7695-4191-4.Design and implementation of an agent-based smart home system., , , , and . iCAST, page 227-232. IEEE, (2012)Hash-Based Distributed Public Key Infrastructure for Ubiquitous Environments., , , , , and . CISIS, page 376-383. IEEE Computer Society, (2010)A Flexible and Secure Access Control Scheme Using Social Behavior in the Real World., , , , , and . CISIS, page 375-381. IEEE Computer Society, (2009)Agent-Aided 3D Symbiotic Space., , , , and . ACIS-ICIS, page 605-610. IEEE Computer Society, (2010)Visitor Access Control Scheme Utilizing Social Relationship in the Real World., , , , , and . IFIPTM, volume 321 of IFIP Advances in Information and Communication Technology, page 95-107. Springer, (2010)Effects of Encoding Bit Rates on User Level QoS for Video Streaming., , , , , and . EuroIMSA, page 41-46. IASTED/ACTA Press, (2005)