print this page
  1. No Image 09Dec
    by
    in 국제

    The Vulnerability Assessment for Active Networks-Model, Policy, Procedures, and Performance Evaluations (SCIE)

  2. No Image 09Dec
    by
    in 국제

    Specifying Policies for Service Negotiation of Response Time (SCIE)

  3. No Image 09Dec
    by
    in 국제

    SVAM: the Scalable Vulnerability Analysis Model based on Active Networks (SCIE)

  4. No Image 09Dec
    by
    in 국제

    MonST: Network Mobility Management based on State Table of Mobile Nodes

  5. No Image 09Dec
    by
    in 국제

    A Model and Evaluation of Pinball Routing Solution Approaches in Nested NEMO Environment

  6. No Image 09Dec
    by
    in 국제

    Service Negotiation Model for Response Time in Distributed networks

  7. No Image 09Dec
    by
    in 국제

    An AAA Mechanism Using Minimal Public-Key Based Authentication in Mobile IPv6 Networks

  8. No Image 09Dec
    by
    in 국제

    Dual Routing in Mobile IPv6 using PBHR mechanism

  9. No Image 09Dec
    by
    in 국제

    A Study on decrase of transaction overheads in DNSSEC using PreProcessor

  10. No Image 09Dec
    by
    in 국제

    Policy Based Handoff in MIPv6 Networks (SCIE)

  11. No Image 09Dec
    by
    in 국제

    New Binding Update Method sing GDMHA in Hierarchical Mobile IPv6 (SCIE)

  12. No Image 09Dec
    by
    in 국제

    A Model and Evaluation of Route Optimization in Nested NEMO Environment (SCI)

  13. No Image 09Dec
    by
    in 국제

    An Analysis and Evaluation of Policy-based Network Management Approaches (SCIE)

  14. No Image 09Dec
    by
    in 국제

    Distributing Multiple Home Agents in MIPv6 Networks (SCIE)

  15. No Image 09Dec
    by
    in 국제

    Correlation Analysis System using VA data, IDS alerts (SCIE)

  16. No Image 09Dec
    by
    in 국제

    A Study for Security and Efficient Broadcasting of Sensor Network

  17. No Image 09Dec
    by
    in 국제

    An Architecture Design of Distributed Internet Worm Detection System for Fast Response

  18. No Image 09Dec
    by
    in 국제

    A Study on Mobile IPv4 Authentication Mechanisms

  19. No Image 09Dec
    by
    in 국제

    A study about weight grant of Authentication level in USN environment

  20. No Image 09Dec
    by
    in 국제

    A Study on Cooperation between Kerberos system and Credit-Control Server

Board Pagination Prev 1 2 3 4 5 6 7 Next
/ 7

로그인

로그인폼

로그인 유지