您当前的位置:
首页 >
文章列表页 >
Secure topology protocol for mobile peer-to-peer networks
更新时间:2024-10-14
    • Secure topology protocol for mobile peer-to-peer networks

    • Vol. 31, Issue 10, Pages: 146-157(2010)
    • CLC: TN929.5
    • Published:2010

    移动端阅览

  • LI Zhi-yuan1, WANG Ru-chuan1. Secure topology protocol for mobile peer-to-peer networks[J]. 2010, 31(10): 146-157. DOI:

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

876

下载量

3

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Secure and efficient power data sharing platform construction approach based on blockchain oracle
Fairly verifiable multi-user homomorphic proxy re-encryption scheme
Practical implementation of a full-stack information technology application innovation industry-compliant email system
Rational-security and fair two-party comparison protocol
Secure and collaborative spectrum sensing scheme based on audit game

Related Author

LU Ning
CHEN Fangyu
LIU Zenghui
WANG Qinghao
SHI Wenbo
MA Jianfeng
HOU Jinqiu
PENG Changgen

Related Institution

School of Computer Science and Engineering, Northeastern University
Hebei Key Laboratory of Marine Perception Network and Data Processing
Shenyang Power Supply Company of State Grid Liaoning Province Electric Power Co., Ltd.
School of Cyber Engineering, Xidian University
College of Management Science and Engineering, Anhui University of Finance & Economics
0