Funding Data Link References Status API Help
type
year
publication
category
publisher
funder name
source
Page 1 of 732413 results
Sort by: relevance publication year

The Analysis of Information Security of Campus Network of Scientific Research

Conference Paper published Nov 2014 in 2014 International Conference on Computational Intelligence and Communication Networks

Authors: Shi De-Qin, Lin Qin-Ying, Zhong Qi-Yuan, Li Qiu-Ni

Campus network security solutions based on IPv6

Conference Paper published 1 Mar 2014 in International Workshop on Communication Technology 2013

Authors: Tao Yantao

The Evaluation Model for Network Security

Conference Paper published Apr 2014 in 2014 Fourth International Conference on Communication Systems and Network Technologies

Authors: Zhiyong Lu, Yunyan Zhou

Research on Security Issues and Protection Strategy of Computer Network

Journal Article published 30 Apr 2014 in IJARCCE volume 6 issue 4 on pages 856 to 861

Authors: Gurdeep Singh, Gurjeet Singh, Gurwinder Singh, Er. Charanjit Kaur Raina

Special issue on recent advances in network and information security-security and communication networks journal

Journal Article published 15 Dec 2014 in Security and Communication Networks volume 8 issue 1 on pages 1 to 1

Authors: Xueqi Cheng, Jinhong Yuan, Ali Tajer, Aiqun Hu, Wanlei Zhou

Call for papers: systematic network optimizations for security parameters (security and communication networks)

Journal Article published 10 Mar 2014 in Security and Communication Networks volume 7 issue 11 on pages 2180 to 2180

Authors: Hongmei Zhang, Yongzhuang Wei, Rongxing Lu, Rose Qingyang Hu

Modeling GSM Based Network Communication in Vehicular Network

Journal Article published 8 Feb 2014 in International Journal of Computer Network and Information Security volume 6 issue 3 on pages 37 to 43

Authors: M. Milton Joe, B. Ramakrishnan, R. S. Shaji

Mobile agent information security in ad-hoc network

Conference Paper published Apr 2014 in 2014 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC)

Authors: Jasleen Kaur, Sharad Saxena, Anu Jain

Robust security network association adjusted hybrid authentication schema

Conference Paper published Oct 2014 in 2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)

Authors: Viktors Gopejenko, Sergejs Bobrovskis

A node authentication clustering based security for ADHOC network

Conference Paper published Apr 2014 in 2014 International Conference on Communication and Signal Processing

Authors: Rajamanickam Murugesan, Murugesan Saravanan, Mariappan Vijyaraj