Author:
Bryan D.A.,Lowekamp B.B.,Jennings C.
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Schemes for Verification of Resources in the Cloud: Comparison of the Cloud Technology Providers;Towards Industry 4.0 — Current Challenges in Information Systems;2020
2. A Priority Based Lookup Model for VoIP Applications in Unstructured P2P Networks;Proceedings of the International Conference on Intelligent Information Processing, Security and Advanced Communication;2015-11-23
3. Privacy in Peer-to-Peer Networks;Computer Communications and Networks;2015
4. A Novel Security Architecture for Peer-to-Peer IMS System;Advanced Materials Research;2013-02
5. DHT Theory;Distributed Hash Table;2013