Works matching File Transfer Protocol (Computer network protocol)


Results: 81
    1
    2
    3
    4

    Analysis of Brute Force Attacks with Ylmf-pc Signature.

    Published in:
    International Journal of Electrical & Computer Engineering (2088-8708), 2016, v. 6, n. 4, p. 1681, doi. 10.11591/ijece.v6i4.pp1681-1684
    By:
    • Arzhakov, Anton Valeryevich;
    • Silnov, Dmitry Sergeevich
    Publication type:
    Article
    5
    6
    7
    8

    Large File Transfer.

    Published in:
    International Journal of Micrographics & Optical Technology, 2008, v. 26, n. 1/2, p. 3
    Publication type:
    Article
    9
    10
    11
    12
    13
    14

    CACTUS.

    Published in:
    Australian Mathematics Teacher, 2007, v. 63, n. 2, p. 25
    By:
    • Hyde, Hartley
    Publication type:
    Article
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29

    Middleware adaptation with the Delphoi service.

    Published in:
    Concurrency & Computation: Practice & Experience, 2006, v. 18, n. 13, p. 1659, doi. 10.1002/cpe.1022
    By:
    • Maassen, Jason;
    • van Nieuwpoort, Rob V.;
    • Kielmann, Thilo;
    • Verstoep, Kees;
    • den Burger, Mathijs
    Publication type:
    Article
    30
    31
    32
    33
    34
    35
    36
    37
    38
    39
    40
    41
    42
    43
    44
    45
    46

    Traffic Capacity of UMTS System in Reverse Link.

    Published in:
    Wireless Personal Communications, 2009, v. 51, n. 2, p. 303, doi. 10.1007/s11277-008-9644-5
    By:
    • Chimeh, Jahangir Dadkhah;
    • Hakkak, Mohammad;
    • Azmi, Paeiz;
    • Bakhshi, Hamidreza
    Publication type:
    Article
    47
    48
    49
    50