Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
![]() |
Adaptive video streaming over HTTP with dynamic resource estimationTruong Cong Thang ; Le, Hung T. ; Nguyen, Hoc X. ; Pham, Anh T. ; Jung Won Kang ; Yong Man RoJournal of Communications and Networks, 2013, 15(6), , pp.635-644Seoul: Editorial Department of Journal of Communications and NetworksTexto completo disponível |
2 |
Material Type: Artigo
|
![]() |
Smart grid cooperative communication with smart relayAhmed, Mohammad Helal Uddin ; Alam, Md. Golam Rabiul ; Kamal, Rossi ; Hong, Choong Seon ; Lee, SungwonJournal of Communications and Networks, 2012, 14(6), , pp.640-652Editorial Department of Journal of Communications and NetworksTexto completo disponível |
3 |
Material Type: Artigo
|
![]() |
Identity-based proxy signature from latticesKim, Kee Sung ; Hong, Dowon ; Jeong, Ik RaeJournal of Communications and Networks, 2013, 15(1), , pp.1-7Seoul: Editorial Department of Journal of Communications and NetworksTexto completo disponível |
4 |
Material Type: Artigo
|
![]() |
SplitScreen: Enabling efficient, distributed malware detectionSang Kil Cha ; Moraru, Iulian ; Jiyong Jang ; Truelove, John ; Brumley, David ; Andersen, David G.Journal of Communications and Networks, 2011, 13(2), , pp.187-200Séoul: Editorial Department of Journal of Communications and NetworksTexto completo disponível |
5 |
Material Type: Artigo
|
![]() |
Topology-aware Virtual Network Embedding Using Multiple CharacteristicsLiao, Jianxin ; Feng, Min ; Li, Tonghong ; Wang, Jingyu ; Qing, SudeKSII Transactions on Internet and Information Systems, 2014, 8(1), , pp.145-164 [Periódico revisado por pares]한국인터넷정보학회Texto completo disponível |
6 |
Material Type: Artigo
|
![]() |
Shilling Attacks Against Memory-Based Privacy-Preserving Recommendation AlgorithmsGunes, Ihsan ; Bilge, Alper ; Polat, HuseyinKSII Transactions on Internet and Information Systems, 2013, 7(5), , pp.1272-1290 [Periódico revisado por pares]한국인터넷정보학회Texto completo disponível |
7 |
Material Type: Artigo
|
![]() |
Towards robust key extraction from multipath wireless channelsEl Hajj Shehadeh, Y. ; Alfandi, O. ; Hogrefe, D.Journal of Communications and Networks, 2012, 14(4), , pp.385-395Editorial Department of Journal of Communications and NetworksTexto completo disponível |
8 |
Material Type: Artigo
|
![]() |
Provably Secure Certificate-Based Signcryption Scheme without PairingsLu, Yang ; Li, JiguoKSII Transactions on Internet and Information Systems, 2014, 8(7), , pp.2554-2571 [Periódico revisado por pares]한국인터넷정보학회Texto completo disponível |
9 |
Material Type: Artigo
|
![]() |
Blind QR Code Steganographic Approach Based upon Error Correction CapabilityChiang, Yin-Jen ; Lin, Pei-Yu ; Wang, Ran-Zan ; Chen, Yi-HuiKSII Transactions on Internet and Information Systems, 2013, 7(10), , pp.2527-2543 [Periódico revisado por pares]한국인터넷정보학회Texto completo disponível |
10 |
Material Type: Artigo
|
![]() |
Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange ProtocolsNam, Junghyun ; Choo, Kim-Kwang Raymond ; Kim, Moonseong ; Paik, Juryon ; Won, DonghoKSII Transactions on Internet and Information Systems, 2013, 7(12), , pp.3244-3260 [Periódico revisado por pares]한국인터넷정보학회Texto completo disponível |