Found: 5
Select item for more details and to access through your institution.
Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes.
- Published in:
- Wireless Personal Communications, 2012, v. 66, n. 3, p. 559, doi. 10.1007/s11277-012-0734-z
- By:
- Publication type:
- Article
Power-efficient routing for SDN with discrete link rates and size-limited flow tables: A tree-based particle swarm optimization approach.
- Published in:
- International Journal of Network Management, 2017, v. 27, n. 5, p. n/a, doi. 10.1002/nem.1972
- By:
- Publication type:
- Article
Arbitrary Code Injection through Self-propagating Worms in Von Neumann Architecture Devices.
- Published in:
- Computer Journal, 2010, v. 53, n. 10, p. 1576, doi. 10.1093/comjnl/bxq009
- By:
- Publication type:
- Article
A COMPARATIVE STUDY OF PROTOCOLS FOR EFFICIENT DATA PROPAGATION IN SMART DUST NETWORKS.
- Published in:
- Parallel Processing Letters, 2003, v. 13, n. 4, p. 615, doi. 10.1142/S0129626403001550
- By:
- Publication type:
- Article
People-centric sensing in assistive healthcare: Privacy challenges and directions.
- Published in:
- Security & Communication Networks, 2011, v. 4, n. 11, p. 1295, doi. 10.1002/sec.313
- By:
- Publication type:
- Article