Journals in DBLP
José María Sierra Editorial for the special issue on Internet Communications Security. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:15, pp:2737-2738 [Journal ] Rodrigo Roman , Jianying Zhou , Javier Lopez An anti-spam scheme using pre-challenges. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:15, pp:2739-2749 [Journal ] Antonio Izquierdo Manzanares , José María Sierra , Joaquín Torres Márquez On the implementation of security policies with adaptative encryption. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:15, pp:2750-2758 [Journal ] Min-Hua Shao , Guilin Wang , Jianying Zhou Some common attacks against certified email protocols and the countermeasures. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:15, pp:2759-2769 [Journal ] Hao Wang , Heqing Guo , Manshan Lin , Jianfei Yin , Qi He , Jun Zhang A new dependable exchange protocol. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:15, pp:2770-2780 [Journal ] Joaquín Torres Márquez , Antonio Izquierdo , José María Sierra , Arturo Ribagorda Towards self-authenticable smart cards. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:15, pp:2781-2787 [Journal ] Kim-Kwang Raymond Choo , Colin Boyd , Yvonne Hitchcock The importance of proofs of security for key establishment protocols: Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:15, pp:2788-2797 [Journal ] Kun Peng , Colin Boyd , Ed Dawson Batch verification of validity of bids in homomorphic e-auction. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:15, pp:2798-2805 [Journal ] Asad Amir Pirzada , Amitava Datta , Chris McDonald Incorporating trust and reputation in the DSR protocol for dependable routing. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:15, pp:2806-2821 [Journal ] Raphael Chung-Wei Phan , Bok-Min Goi , Kah-Hoong Wong Cryptanalysis of some improved password-authenticated key exchange schemes. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:15, pp:2822-2829 [Journal ] Sherman S. M. Chow , Lucas Chi Kwong Hui , Siu-Ming Yiu , K. P. Chow Practical electronic lotteries with offline TTP. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:15, pp:2830-2840 [Journal ] W. Yan , Edwin S. H. Hou , Nirwan Ansari Description logics for an autonomic IDS event analysis system. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:15, pp:2841-2852 [Journal ] Michele C. Weigle , Kevin Jeffay , F. Donelson Smith Quantifying the effects of recent protocol improvements to TCP: Impact on Web performance. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:15, pp:2853-2866 [Journal ] Nikos I. Passas , Dimitris Skyrianoglou , Panagiotis Mouziouras Prioritized support of different traffic classes in IEEE 802.11e wireless LANs. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:15, pp:2867-2880 [Journal ] Jaipal Singh , Prakash Veeraraghavan , Samar Singh QoS multicast routing using Explore Best Path. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:15, pp:2881-2894 [Journal ] Jianping Wu , Dan Li , Yong Cui Stability of ALM Tree with selfish receivers: A simulation study. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:15, pp:2895-2903 [Journal ] Hsiang-Fu Yu , Hung-Chang Yang , Pin-Han Ho , Yi-Ming Chen , Li-Ming Tseng A smooth broadcasting scheme for VBR-encoded hot videos. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:15, pp:2904-2916 [Journal ] Lingyu Wang , Anyi Liu , Sushil Jajodia Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:15, pp:2917-2933 [Journal ] Yong-Qian Chen , Kwen-Mun Roh , Sang-Jo Yoo Service index-based fairness scheduling in wireless ad hoc networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:15, pp:2934-2944 [Journal ] Salman AlQahtani , Ashraf S. Mahmoud , Asrar U. Sheikh Adaptive radio resource with borrowing for multi-operators 3G+ wireless networks with heterogeneous traffic. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:15, pp:2945-2951 [Journal ] Wenji Wu , Natalia Gaviria , Kevin M. McNeill , Mingkuan Liu Two-layer hierarchical wavelength routing for islands of transparency optical networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:15, pp:2952-2963 [Journal ] Hsueh-Wen Tseng , Ai-Chun Pang , Chin-Fu Kuo , Shiann-Tsong Sheu Efficient and fast retransmission for wireless networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:15, pp:2964-2974 [Journal ] Yabin Ye , Teck Yoong Chai , Tee Hiang Cheng , Chao Lu Dynamic routing and wavelength assignment algorithms in wavelength division multiplexed translucent optical networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:15, pp:2975-2984 [Journal ] Charilaos A. Tsetsekas , Apostolos G. Fertis , Iakovos S. Venieris Dynamic Application Profiles using Neural Networks for adaptive quality of service support in the Internet. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:15, pp:2985-2995 [Journal ] Eunhee Cho , Kang-Sik Shin , Sang-Jo Yoo SIP-based Qos support architecture and session management in a combined IntServ and DiffServ networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:15, pp:2996-3009 [Journal ] Vasilios A. Siris , Harris M. Marinakis Erratum to "Adaptive packet marking for achieving fairness in DiffServ networks" [Comput. Communications 29 (2006) 52-58]. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:15, pp:3010- [Journal ]