The SCEAS System
Navigation Menu

Journals in DBLP

J. Network and Computer Applications
2004, volume: 27, number: 4

  1. Wei-Bin Lee, Kuan-Chieh Liao
    Constructing identity-based cryptosystems for discrete logarithm based cryptosystems. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2004, v:27, n:4, pp:191-199 [Journal]
  2. Mohammed Zaki, Tarek S. Sobh
    A cooperative agent-based model for active security systems. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2004, v:27, n:4, pp:201-220 [Journal]
  3. Sergio A. Velastin, Benny Lo, Jie Sun
    A flexible communications protocol for a distributed surveillance system. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2004, v:27, n:4, pp:221-253 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002