|
Journals in DBLP
- Brian Neil Levine, Clay Shields
Internet security. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:3, pp:279- [Journal]
- John W. Byers, Jeffrey Considine, Gene Itkis, Mei Chin Cheng, Alex Yeung
Securing bulk content almost for free. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:3, pp:280-290 [Journal]
- T. Perlines Hormann, Konrad Wrona, S. Holtmanns
Evaluation of certificate validation mechanisms. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:3, pp:291-305 [Journal]
- Dogan Kesdogan, Charles Palmer
Technical challenges of network anonymity. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:3, pp:306-324 [Journal]
- Panayiotis Kotzanikolaou, Rosa Mavropodi, Christos Douligeris, Vassilios Chrissikopoulos
Secure distributed intelligent networks. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:3, pp:325-336 [Journal]
- Dario Di Sorte, Mauro Femminella, Leonardo Piacentini, Gianluca Reali
Target access router selection in advanced mobility scenarios. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:3, pp:337-357 [Journal]
- Shiann-Tsong Sheu, Yun-Yen Shih, Yue-Ru Chuang
An ACK-based polling strategy for supporting high performance and QoS in IEEE 802.11 wireless networks. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:3, pp:358-371 [Journal]
- Athanasios Drigas, S. Kouremenos, Y. Bakopoulos, Vassilis Loumos
A study of H.263 traffic modeling in multipoint videoconference sessions over IP networks. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:3, pp:372-391 [Journal]
- Gang Cheng, Nirwan Ansari
Finding a least hop(s) path subject to multiple additive constraints. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:3, pp:392-401 [Journal]
- Ajay Pal Singh Virk, Raouf Boutaba
Economical protection in MPLS networks. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:3, pp:402-408 [Journal]
|