nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptive radio resource with borrowing for multi-operators 3G+ wireless networks with heterogeneous traffic
|
AlQahtani, Salman |
|
2006 |
29 |
15 |
p. 2945-2951 7 p. |
artikel |
2 |
An anti-spam scheme using pre-challenges
|
Roman, Rodrigo |
|
2006 |
29 |
15 |
p. 2739-2749 11 p. |
artikel |
3 |
A new dependable exchange protocol
|
Wang, Hao |
|
2006 |
29 |
15 |
p. 2770-2780 11 p. |
artikel |
4 |
A smooth broadcasting scheme for VBR-encoded hot videos
|
Yu, Hsiang-Fu |
|
2006 |
29 |
15 |
p. 2904-2916 13 p. |
artikel |
5 |
Batch verification of validity of bids in homomorphic e-auction
|
Peng, Kun |
|
2006 |
29 |
15 |
p. 2798-2805 8 p. |
artikel |
6 |
Cryptanalysis of some improved password-authenticated key exchange schemes
|
Phan, Raphael C.-W. |
|
2006 |
29 |
15 |
p. 2822-2829 8 p. |
artikel |
7 |
Description logics for an autonomic IDS event analysis system
|
Yan, W. |
|
2006 |
29 |
15 |
p. 2841-2852 12 p. |
artikel |
8 |
Dynamic Application Profiles using Neural Networks for adaptive quality of service support in the Internet
|
Tsetsekas, Charilaos A. |
|
2006 |
29 |
15 |
p. 2985-2995 11 p. |
artikel |
9 |
Dynamic routing and wavelength assignment algorithms in wavelength division multiplexed translucent optical networks
|
Ye, Yabin |
|
2006 |
29 |
15 |
p. 2975-2984 10 p. |
artikel |
10 |
Editorial for the special issue on Internet Communications Security
|
Sierra, José María |
|
2006 |
29 |
15 |
p. 2737-2738 2 p. |
artikel |
11 |
Efficient and fast retransmission for wireless networks
|
Tseng, Hsueh-Wen |
|
2006 |
29 |
15 |
p. 2964-2974 11 p. |
artikel |
12 |
Erratum to “Adaptive packet marking for achieving fairness in DiffServ networks” [Comput. Commun. 29 (2006) 52–58]
|
Siris, Vasilios A. |
|
2006 |
29 |
15 |
p. 3010- 1 p. |
artikel |
13 |
IFC Editorial Board
|
|
|
2006 |
29 |
15 |
p. CO2- 1 p. |
artikel |
14 |
Incorporating trust and reputation in the DSR protocol for dependable routing
|
Pirzada, Asad Amir |
|
2006 |
29 |
15 |
p. 2806-2821 16 p. |
artikel |
15 |
OBC - Contents
|
|
|
2006 |
29 |
15 |
p. CO4- 1 p. |
artikel |
16 |
On the implementation of security policies with adaptative encryption
|
Manzanares, Antonio Izquierdo |
|
2006 |
29 |
15 |
p. 2750-2758 9 p. |
artikel |
17 |
Practical electronic lotteries with offline TTP
|
Chow, Sherman S.M. |
|
2006 |
29 |
15 |
p. 2830-2840 11 p. |
artikel |
18 |
Prioritized support of different traffic classes in IEEE 802.11e wireless LANs
|
Passas, Nikos |
|
2006 |
29 |
15 |
p. 2867-2880 14 p. |
artikel |
19 |
QoS multicast routing using Explore Best Path
|
Singh, Jaipal |
|
2006 |
29 |
15 |
p. 2881-2894 14 p. |
artikel |
20 |
Quantifying the effects of recent protocol improvements to TCP: Impact on Web performance
|
Weigle, Michele C. |
|
2006 |
29 |
15 |
p. 2853-2866 14 p. |
artikel |
21 |
Service index-based fairness scheduling in wireless ad hoc networks
|
Chen, Yong-Qian |
|
2006 |
29 |
15 |
p. 2934-2944 11 p. |
artikel |
22 |
SIP-based Qos support architecture and session management in a combined IntServ and DiffServ networks
|
Cho, Eun-Hee |
|
2006 |
29 |
15 |
p. 2996-3009 14 p. |
artikel |
23 |
Some common attacks against certified email protocols and the countermeasures
|
Shao, Min-Hua |
|
2006 |
29 |
15 |
p. 2759-2769 11 p. |
artikel |
24 |
Stability of ALM Tree with selfish receivers: A simulation study
|
Wu, Jianping |
|
2006 |
29 |
15 |
p. 2895-2903 9 p. |
artikel |
25 |
The importance of proofs of security for key establishment protocols
|
Raymond Choo, Kim-Kwang |
|
2006 |
29 |
15 |
p. 2788-2797 10 p. |
artikel |
26 |
Towards self-authenticable smart cards
|
Torres, Joaquin |
|
2006 |
29 |
15 |
p. 2781-2787 7 p. |
artikel |
27 |
Two-layer hierarchical wavelength routing for islands of transparency optical networks
|
Wu, Wenji |
|
2006 |
29 |
15 |
p. 2952-2963 12 p. |
artikel |
28 |
Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts
|
Wang, Lingyu |
|
2006 |
29 |
15 |
p. 2917-2933 17 p. |
artikel |