books search
books
articles search
articles
Donate
Log In
Log In
to access more features
personal recommendations
Telegram Bot
download history
send to Email or Kindle
manage booklists
save to favorites
Explore
Journals
Contribution
Donate
Litera Library
Donate paper books
Add paper books
Open LITERA Point
Volume 15; Issue 1
Main
Journal of Computer Security
Volume 15; Issue 1
Journal of Computer Security
Volume 15; Issue 1
1
Securing vehicular ad hoc networks
Raya, Maxim
,
Hubaux, Jean-Pierre
,
Ning, Peng
,
Du, Wenliang
Journal:
Journal of Computer Security
Year:
2007
Language:
english
File:
PDF, 354 KB
Your tags:
english, 2007
2
SIA: Secure information aggregation in sensor networks
Chan, Haowen
,
Perrig, Adrian
,
Przydatek, Bartosz
,
Song, Dawn
,
Ning, Peng
,
Du, Wenliang
Journal:
Journal of Computer Security
Year:
2007
Language:
english
File:
PDF, 224 KB
Your tags:
english, 2007
3
On the security of group communication schemes
Xu, Shouhuai
,
Ning, Peng
,
Du, Wenliang
Journal:
Journal of Computer Security
Year:
2007
File:
PDF, 335 KB
Your tags:
2007
4
Robust RSA distributed signatures for large-scale long-lived ad hoc networks
Zanin, Giorgio
,
Di Pietro, Roberto
,
Mancini, Luigi V.
,
Ning, Peng
,
Du, Wenliang
Journal:
Journal of Computer Security
Year:
2007
Language:
english
File:
PDF, 204 KB
Your tags:
english, 2007
5
Message from the Guest Editors
Ning, Peng
,
Du, Wenliang
Journal:
Journal of Computer Security
Year:
2007
Language:
english
File:
PDF, 28 KB
Your tags:
english, 2007
6
Hermes: A quantitative trust establishment framework for reliable data packet delivery in MANETs
Zouridaki, Charikleia
,
Mark, Brian L.
,
Hejmo, Marek
,
Thomas, Roshan K.
,
Ning, Peng
,
Du, Wenliang
Journal:
Journal of Computer Security
Year:
2007
Language:
english
File:
PDF, 462 KB
Your tags:
english, 2007
7
Hermes: A quantitative trust establishment framework for reliable data packet delivery in MANETs
Zouridaki, Charikleia
,
Mark, Brian L.
,
Hejmo, Marek
,
Thomas, Roshan K.
,
Ning, Peng
,
Du, Wenliang
Journal:
Journal of Computer Security
Year:
2007
File:
PDF, 462 KB
Your tags:
2007
8
Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers
Radosavac, S.
,
Cárdenas, Alvaro A.
,
Baras, John S.
,
Moustakides, George V.
,
Ning, Peng
,
Du, Wenliang
Journal:
Journal of Computer Security
Year:
2007
File:
PDF, 265 KB
Your tags:
2007
1
Follow
this link
or find "@BotFather" bot on Telegram
2
Send /newbot command
3
Specify a name for your chatbot
4
Choose a username for the bot
5
Copy an entire last message from BotFather and paste it here
×
×