Author of the publication

A New Authentication Method with Distributed Hash Table for P2P Network.

, , , , , and . AINA Workshops, page 483-488. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effects of Encoding Bit Rates on User Level QoS for Video Streaming., , , , , and . EuroIMSA, page 41-46. IASTED/ACTA Press, (2005)An Intelligent LOTOS interpreter in AMLOG., , and . ICLP Workshop: Applications of Logic Programming to Software Engineering, (1994)An Intelligent Prediction Based Approach for Mobility Tracking in PCN., , and . International Conference on Internet Computing (1), page 528-534. CSREA Press, (2001)A Computing Model to Bridge a Gap between Real Space and Web Space., , , , and . WEBIST (3), page 107-112. INSTICC Press, (2007)Development of a Monitoring System Based on Power Consumption., , , , , , and . NBiS, volume 7 of Lecture Notes on Data Engineering and Communications Technologies, page 363-372. Springer, (2017)Integrated Support Environment for Concurrent Process Calculi., , and . PODC, page 395. ACM, (1994)Dynamic Behavior of Multiagents with Subjective Cooperative Relations., , and . ICOIN (2), volume 2344 of Lecture Notes in Computer Science, page 634-643. Springer, (2002)A growing network that optimizes between undertraining and overtraining., , , and . ICNN, page 1116-1120. IEEE, (1995)Neural networks for solving constrained Steiner tree problem., , and . ICNN, page 1867-1870. IEEE, (1995)Blockchain-Based Malware Detection Method Using Shared Signatures of Suspected Malware Files., , , , , , , and . NBiS, volume 1036 of Advances in Intelligent Systems and Computing, page 305-316. Springer, (2019)