Works matching DE "AGREEMENT protocols (Computer network protocols)"
1
- Personal & Ubiquitous Computing, 2013, v. 17, n. 5, p. 1013, doi. 10.1007/s00779-012-0548-8
- El Husseini, Anas;
- M'Hamed, Abdallah;
- El Hassan, Bachar;
- Mokhtari, Mounir
- Article
2
- Relational Social Work, 2024, v. 8, n. 1, p. 77, doi. 10.14605/RSW812405
- Russo, Patrizia;
- Santone, Elita
- Article
3
- Modern Physics Letters B, 2016, v. 30, n. 26, p. -1, doi. 10.1142/S0217984916503322
- Article
4
- Peer-to-Peer Networking & Applications, 2017, v. 10, n. 1, p. 79, doi. 10.1007/s12083-015-0408-1
- Mir, Omid;
- Munilla, Jorge;
- Kumari, Saru
- Article
5
- International Journal of Reconfigurable Computing, 2013, p. 1, doi. 10.1155/2013/517947
- Beyrouthy, Taha;
- Fesquet, Laurent
- Article
6
- Information Technology & Control, 2018, v. 47, n. 3, p. 431, doi. 10.5755/j01.itc.47.3.17361
- Irshad, Azeem;
- Naqvi, Husnain;
- Chaudhry, Shehzad Ashraf;
- Usman, Muhammad;
- Shafiq, Muhammad;
- Mir, Omid;
- Kanwal, Ambrina
- Article
7
- ISeCure, 2013, v. 5, n. 1, p. 55
- Farash, Mohammad Sabzinejad;
- Attari, Mahmoud Ahmadian
- Article
8
- ISeCure, 2013, v. 5, n. 1, p. 1
- Article
9
- Computers, Materials & Continua, 2019, v. 58, n. 3, p. 603, doi. 10.32604/cmc.2019.05341
- Kaddi, Mohammed;
- Benahmed, Khelifa;
- Omari, Mohammed
- Article
10
- Journal of Information Assurance & Security, 2012, v. 7, n. 3, p. 127
- Dongyang Xu;
- Zhi Tang;
- Yinyan Yu;
- Cheng Qu
- Article
11
- Modern Physics Letters A, 2018, v. 33, n. 36, p. N.PAG, doi. 10.1142/S0217732318502103
- Article
12
- International Journal of Theoretical Physics, 2018, v. 57, n. 1, p. 195, doi. 10.1007/s10773-017-3553-x
- Liu, Wen-Jie;
- Xu, Yong;
- Yang, Ching-Nung;
- Gao, Pei-Pei;
- Yu, Wen-Bin
- Article
13
- Electronics Letters (Wiley-Blackwell), 2016, v. 52, n. 20, p. 1677, doi. 10.1049/el.2016.2338
- Haopeng Zhang;
- Zhiguo Jiang
- Article
14
- Journal of Law, Technology & the Internet, 2014, v. 5, n. 1, p. 201
- Article
15
- Journal of Chinese Political Science, 2016, v. 21, n. 2, p. 177, doi. 10.1007/s11366-016-9403-5
- Article
16
- Wireless Personal Communications, 2016, v. 86, n. 3, p. 1095, doi. 10.1007/s11277-015-2975-0
- Article
17
- Wireless Personal Communications, 2014, v. 78, n. 2, p. 1487, doi. 10.1007/s11277-014-1829-5
- Article
18
- Symmetry (20738994), 2016, v. 8, n. 11, p. 131, doi. 10.3390/sym8110131
- Jie Zhang;
- Xin Huang;
- Craig, Paul;
- Marshall, Alan;
- Dawei Liu
- Article
19
- Quantum Information Processing, 2018, v. 17, n. 6, p. 1, doi. 10.1007/s11128-018-1910-1
- Gao, Hao;
- Chen, Xiao-Guang;
- Qian, Song-Rong
- Article
20
- Quantum Information Processing, 2015, v. 14, n. 9, p. 3483, doi. 10.1007/s11128-015-1060-7
- Article
21
- Antistasis: An Open Educational Journal, 2015, v. 5, n. 2, p. 50
- Beaton, Brian;
- Carpenter, Penny
- Article
22
- Parallel Processing Letters, 2016, v. 26, n. 1, p. -1, doi. 10.1142/S0129626416500031
- Maurer, Alexandre;
- Tixeuil, Sebastien
- Article
23
- International Journal of Distributed Sensor Networks, 2013, p. 1, doi. 10.1155/2013/476313
- Dongfeng Xie;
- Qi Sun;
- Qianwei Zhou;
- Yunzhou Qiu;
- Xiaobing Yuan
- Article
24
- Journal of Cryptology, 2016, v. 29, n. 4, p. 879, doi. 10.1007/s00145-015-9212-6
- Asharov, Gilad;
- Canetti, Ran;
- Hazay, Carmit
- Article
25
- Evidence-Based Dentistry, 2017, v. 18, n. 4, p. 127, doi. 10.1038/sj.ebd.6401278
- Article
26
- Turkish Journal of Electrical Engineering & Computer Sciences, 2015, v. 23, n. 2, p. 560, doi. 10.3906/elk-1207-102
- KILINÇ, Hacı Hakan;
- ALLABERDİYEV, Yolguly;
- YANIK, Tuğrul;
- ERDEM, Serdar Süer
- Article
27
- International Journal of Information Security, 2017, v. 16, n. 5, p. 559, doi. 10.1007/s10207-016-0339-8
- Zhang, Lei;
- Wu, Qianhong;
- Qin, Bo;
- Deng, Hua;
- Li, Jiangtao;
- Liu, Jianwei;
- Shi, Wenchang
- Article
28
- International Journal of Information Security, 2016, v. 15, n. 6, p. 659, doi. 10.1007/s10207-015-0306-9
- Cremers, Cas;
- Horvat, Marko
- Article
29
- International Journal of Information Security, 2016, v. 15, n. 6, p. 573, doi. 10.1007/s10207-016-0353-x
- Chen, Liqun;
- Mitchell, Chris
- Article
30
- Journal of Algebraic Statistics, 2022, v. 13, n. 3, p. 3647
- Article
31
- Security & Communication Networks, 2016, v. 9, n. 11, p. 1321, doi. 10.1002/sec.1417
- Lu, Yanrong;
- Li, Lixiang;
- Peng, Haipeng;
- Yang, Yixian
- Article
32
- Security & Communication Networks, 2015, v. 8, n. 18, p. 4289, doi. 10.1002/sec.1342
- Article
33
- Security & Communication Networks, 2015, v. 8, n. 11, p. 1971, doi. 10.1002/sec.1145
- Tsai, Jia-Lun;
- Lo, Nai-Wei
- Article
34
- Security & Communication Networks, 2013, v. 6, n. 5, p. 631, doi. 10.1002/sec.595
- Li, Xiaowei;
- Zhang, Yuqing;
- Zhang, Geifei
- Article
35
- Asian Journal of Control, 2014, v. 16, n. 5, p. 1300, doi. 10.1002/asjc.868
- Rahimian, Mohammad Amin;
- Ajorlou, Amir;
- Aghdam, Amir G.
- Article
36
- Algorithms, 2018, v. 11, n. 9, p. 141, doi. 10.3390/a11090141
- Pires, Miguel;
- Ravi, Srivatsan;
- Rodrigues, Rodrigo
- Article
37
- KSII Transactions on Internet & Information Systems, 2017, v. 11, n. 3, p. 1742, doi. 10.3837/tiis.2017.03.027
- Mehmood, Zahid;
- Gongliang Chen;
- Jianhua Li;
- Albeshri, Aiiad
- Article
38
- KSII Transactions on Internet & Information Systems, 2017, v. 11, n. 2, p. 924, doi. 10.3837/tiis.2017.02.016
- Xiaoxue Liu;
- Yanping Li;
- Juan Qu;
- Yong Ding
- Article
39
- KSII Transactions on Internet & Information Systems, 2016, v. 10, n. 12, p. 5572, doi. 10.3837/tiis.2016.12.023
- Irshad, Azeem;
- Ahmad, Hafiz Farooq;
- Alzahrani, Bander A.;
- Sher, Muhammad;
- Chaudhry, Shehzad Ashraf
- Article
40
- Journal of Network & Systems Management, 2018, v. 26, n. 4, p. 857, doi. 10.1007/s10922-017-9445-9
- Ma, Pufang;
- You, Jiali;
- Wang, Lingfang;
- Wang, Jinlin
- Article
41
- Journal of Mathematical Sciences, 2013, v. 195, n. 4, p. 439, doi. 10.1007/s10958-013-1588-y
- Inassaridze, N.;
- Kandelaki, T.;
- Ladra, M.
- Article
42
- Transactions on Emerging Telecommunications Technologies, 2019, v. 30, n. 6, p. N.PAG, doi. 10.1002/ett.3633
- Sharma, Gaurav;
- Kuchta, Veronika;
- Anand Sahu, Rajeev;
- Ellinidou, Soultana;
- Bala, Suman;
- Markowitch, Olivier;
- Dricot, Jean‐Michel
- Article
43
- Contract Management, 2024, v. 64, n. 3, p. 52
- HALL, POLLY;
- COOKE, TIMOTHY
- Article
44
- Computer Journal, 2024, v. 67, n. 8, p. 2586, doi. 10.1093/comjnl/bxae027
- Guo, Kaiwen;
- Hu, Kexin;
- Zhang, Zhenfeng
- Article
45
- Computer Journal, 2016, v. 59, n. 7, p. 945, doi. 10.1093/comjnl/bxv098
- LIU, JOSEPH K.;
- SZE LING YEO;
- WUN-SHE YAP;
- CHOW, SHERMAN S. M.;
- WONG, DUNCAN S.;
- SUSILO, WILLY
- Article
46
- Computer Journal, 2014, v. 57, n. 10, p. 1580
- Xu, Chang;
- Guo, Hua;
- Li, Zhoujun;
- Mu, Yi
- Article
47
- International Arab Journal of Information Technology (IAJIT), 2016, v. 13, n. 5, p. 492
- Thangavelu, Subashri;
- Vijaykumar, Vaidehi
- Article
48
- Adhoc & Sensor Wireless Networks, 2013, v. 17, n. 3/4, p. 221
- TSAI, JLA-LUN;
- LO, NAI-WEI;
- WU, TZONG-CHEN
- Article