nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A hybrid Wi-Fi P2P with bluetooth low energy for optimizing smart device’s communication property
|
Joh, Hangki |
|
2014 |
8 |
4 |
p. 567-577 |
artikel |
2 |
An approach to mitigate DoS attack based on routing misbehavior in wireless ad hoc networks
|
Lee, Gunhee |
|
2013 |
8 |
4 |
p. 684-693 |
artikel |
3 |
An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks
|
Shin, Soobok |
|
2013 |
8 |
4 |
p. 674-683 |
artikel |
4 |
Annotation alignment method on P2P-TV system
|
Park, Seung-Bo |
|
2014 |
8 |
4 |
p. 578-586 |
artikel |
5 |
A study on memory dump analysis based on digital forensic tools
|
Seo, Jungtaek |
|
2013 |
8 |
4 |
p. 694-703 |
artikel |
6 |
Distributed hybrid P2P networking systems
|
Han, Jungsoo |
|
2014 |
8 |
4 |
p. 555-556 |
artikel |
7 |
Editor’s Note: Special issue on advanced P2P security and privacy
|
|
|
2015 |
8 |
4 |
p. 641 |
artikel |
8 |
Estimating unreliable objects and system reliability in P2P networks
|
Kim, Kapsu |
|
2014 |
8 |
4 |
p. 610-619 |
artikel |
9 |
Extracting real IP address used to connect to P2P messenger using ARIT agent
|
Kim, Yong-Ho |
|
2014 |
8 |
4 |
p. 620-630 |
artikel |
10 |
Information retrieval system using the keyword concept net of the P2P service-based in the mobile cloud environment
|
Moon, Seok-Jae |
|
2014 |
8 |
4 |
p. 596-609 |
artikel |
11 |
Key exchange process of PIM-SM-based for Multiple Group Communication in P2P
|
Kim, Si-Jung |
|
2014 |
8 |
4 |
p. 587-595 |
artikel |
12 |
LSC2: An extended link state protocol with centralized control
|
Zhao, Dan |
|
2013 |
8 |
4 |
p. 651-663 |
artikel |
13 |
Merging sub-networks in VANETs by using the IEEE 802.11xx protocols
|
Caballero-Gil, Cándido |
|
2014 |
8 |
4 |
p. 664-673 |
artikel |
14 |
Network processor architecture with flow-based dynamic bandwidth control for efficient QoS provisioning
|
Park, Jongsu |
|
2013 |
8 |
4 |
p. 704-715 |
artikel |
15 |
QoS-aware data forwarding architecture for multimedia streaming services in hybrid peer-to-peer networks
|
Kim, Seokhoon |
|
2014 |
8 |
4 |
p. 557-566 |
artikel |
16 |
Securing network coding against pollution attacks in P2P converged ubiquitous networks
|
He, Ming |
|
2013 |
8 |
4 |
p. 642-650 |
artikel |
17 |
The biometric signature delegation scheme to balance the load of digital signing in hybrid P2P networks
|
Yun, Sunghyun |
|
2014 |
8 |
4 |
p. 631-640 |
artikel |
18 |
Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis
|
Jeong, Kitae |
|
2013 |
8 |
4 |
p. 716-732 |
artikel |