-
221
Analysis and improvement for authentication protocols of mobile ad hoc network with CSP approach
Published 2013-08-01Subjects: Get full text
Article -
222
Autonomic grid architecture based on information pool protocol
Published 2008-01-01Subjects: Get full text
Article -
223
Universally composable secure trusted access protocol for WLAN Mesh networks
Published 2008-01-01Subjects: Get full text
Article -
224
Study of BGP secure scheme based on divide and conquer strategy
Published 2012-05-01Subjects: “…border gateway protocol security…”
Get full text
Article -
225
-
226
Cross-layer multi-channel MAC protocol combined with QoS search for cognitive wireless multi-hop networks
Published 2013-04-01Subjects: Get full text
Article -
227
Route optimization scheme for nested mobile networks based on extending neighbor discovery protocol
Published 2015-04-01Subjects: Get full text
Article -
228
-
229
Pseudo gossip routing algorithm based link stability in mobile ad hoc networks
Published 2008-01-01Subjects: Get full text
Article -
230
-
231
Delirium and Cognitive Screening in National Hip Fracture Registries: Scoping Review Protocol [version 2; peer review: 2 approved]
Published 2025-01-01Subjects: “…scoping review protocol…”
Get full text
Article -
232
Payload State Prediction Based on Real-Time IoT Network Traffic Using Hierarchical Clustering with Iterative Optimization
Published 2024-12-01Subjects: Get full text
Article -
233
Research and implementation of reputation-based inter-domain routing selection mechanism
Published 2023-06-01Subjects: “…border gateway protocol…”
Get full text
Article -
234
Low duty cycle and low collision asynchronous MAC protocol for wireless sensor network
Published 2013-10-01Subjects: Get full text
Article -
235
Research and Achievement of Redundancy Elimination of Backbone Network
Published 2013-09-01Subjects: Get full text
Article -
236
Protocol for the quantitative detection of mtDNA in the supernatants of activated human naive CD8+ T cells
Published 2025-03-01Subjects: Get full text
Article -
237
Research on wormhole attacks in wireless mesh networks
Published 2011-01-01Subjects: Get full text
Article -
238
Predicate-based authenticated key exchange protocol with attribute-hiding
Published 2012-09-01Subjects: “…key exchange protocol…”
Get full text
Article -
239
-
240
Lightweight authentication method for network interconnection control protocols
Published 2018-11-01Subjects: “…security communication protocol…”
Get full text
Article