The SCEAS System
Navigation Menu

Journals in DBLP

Computer Communications
2006, volume: 29, number: 15

  1. José María Sierra
    Editorial for the special issue on Internet Communications Security. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2737-2738 [Journal]
  2. Rodrigo Roman, Jianying Zhou, Javier Lopez
    An anti-spam scheme using pre-challenges. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2739-2749 [Journal]
  3. Antonio Izquierdo Manzanares, José María Sierra, Joaquín Torres Márquez
    On the implementation of security policies with adaptative encryption. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2750-2758 [Journal]
  4. Min-Hua Shao, Guilin Wang, Jianying Zhou
    Some common attacks against certified email protocols and the countermeasures. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2759-2769 [Journal]
  5. Hao Wang, Heqing Guo, Manshan Lin, Jianfei Yin, Qi He, Jun Zhang
    A new dependable exchange protocol. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2770-2780 [Journal]
  6. Joaquín Torres Márquez, Antonio Izquierdo, José María Sierra, Arturo Ribagorda
    Towards self-authenticable smart cards. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2781-2787 [Journal]
  7. Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
    The importance of proofs of security for key establishment protocols: Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2788-2797 [Journal]
  8. Kun Peng, Colin Boyd, Ed Dawson
    Batch verification of validity of bids in homomorphic e-auction. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2798-2805 [Journal]
  9. Asad Amir Pirzada, Amitava Datta, Chris McDonald
    Incorporating trust and reputation in the DSR protocol for dependable routing. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2806-2821 [Journal]
  10. Raphael Chung-Wei Phan, Bok-Min Goi, Kah-Hoong Wong
    Cryptanalysis of some improved password-authenticated key exchange schemes. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2822-2829 [Journal]
  11. Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow
    Practical electronic lotteries with offline TTP. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2830-2840 [Journal]
  12. W. Yan, Edwin S. H. Hou, Nirwan Ansari
    Description logics for an autonomic IDS event analysis system. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2841-2852 [Journal]
  13. Michele C. Weigle, Kevin Jeffay, F. Donelson Smith
    Quantifying the effects of recent protocol improvements to TCP: Impact on Web performance. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2853-2866 [Journal]
  14. Nikos I. Passas, Dimitris Skyrianoglou, Panagiotis Mouziouras
    Prioritized support of different traffic classes in IEEE 802.11e wireless LANs. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2867-2880 [Journal]
  15. Jaipal Singh, Prakash Veeraraghavan, Samar Singh
    QoS multicast routing using Explore Best Path. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2881-2894 [Journal]
  16. Jianping Wu, Dan Li, Yong Cui
    Stability of ALM Tree with selfish receivers: A simulation study. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2895-2903 [Journal]
  17. Hsiang-Fu Yu, Hung-Chang Yang, Pin-Han Ho, Yi-Ming Chen, Li-Ming Tseng
    A smooth broadcasting scheme for VBR-encoded hot videos. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2904-2916 [Journal]
  18. Lingyu Wang, Anyi Liu, Sushil Jajodia
    Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2917-2933 [Journal]
  19. Yong-Qian Chen, Kwen-Mun Roh, Sang-Jo Yoo
    Service index-based fairness scheduling in wireless ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2934-2944 [Journal]
  20. Salman AlQahtani, Ashraf S. Mahmoud, Asrar U. Sheikh
    Adaptive radio resource with borrowing for multi-operators 3G+ wireless networks with heterogeneous traffic. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2945-2951 [Journal]
  21. Wenji Wu, Natalia Gaviria, Kevin M. McNeill, Mingkuan Liu
    Two-layer hierarchical wavelength routing for islands of transparency optical networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2952-2963 [Journal]
  22. Hsueh-Wen Tseng, Ai-Chun Pang, Chin-Fu Kuo, Shiann-Tsong Sheu
    Efficient and fast retransmission for wireless networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2964-2974 [Journal]
  23. Yabin Ye, Teck Yoong Chai, Tee Hiang Cheng, Chao Lu
    Dynamic routing and wavelength assignment algorithms in wavelength division multiplexed translucent optical networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2975-2984 [Journal]
  24. Charilaos A. Tsetsekas, Apostolos G. Fertis, Iakovos S. Venieris
    Dynamic Application Profiles using Neural Networks for adaptive quality of service support in the Internet. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2985-2995 [Journal]
  25. Eunhee Cho, Kang-Sik Shin, Sang-Jo Yoo
    SIP-based Qos support architecture and session management in a combined IntServ and DiffServ networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2996-3009 [Journal]
  26. Vasilios A. Siris, Harris M. Marinakis
    Erratum to "Adaptive packet marking for achieving fairness in DiffServ networks" [Comput. Communications 29 (2006) 52-58]. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:3010- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002