ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l
Latest Publications
TOTAL DOCUMENTS
147
(FIVE YEARS 0)
H-INDEX
11
(FIVE YEARS 0)
Published By IEEE
0769524214
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
AntiWorm NPU-based Parallel Bloom Filters for TCP/IP Content Processing in Giga-Ethernet LAN
The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l
◽
10.1109/lcn.2005.31
◽
2005
◽
Cited By ~ 3
Author(s):
Zhen Chen
◽
Chuang Lin
◽
Jia Ni
◽
Dong-Hua Ruan
◽
Bo Zheng
◽
...
Keyword(s):
Bloom Filters
◽
Content Processing
Download Full-text
A general signalling approach for local adaptation
The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l
◽
10.1109/lcn.2005.5
◽
2005
◽
Author(s):
A. Takacs
◽
A. Kovacs
◽
F. Kalleitner
◽
H. Brand
Keyword(s):
Local Adaptation
Download Full-text
Rate-based flow-control for the CICQ switch
The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l
◽
10.1109/lcn.2005.113
◽
2005
◽
Cited By ~ 5
Author(s):
K. Yoshigoe
Keyword(s):
Flow Control
Download Full-text
Data relaying with optimal resource management in wireless sensor networks
The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l
◽
10.1109/lcn.2005.45
◽
2005
◽
Cited By ~ 1
Author(s):
R. Benkoczi
◽
H. Hassanein
◽
S. Akl
◽
S. Tai
Keyword(s):
Wireless Sensor Networks
◽
Resource Management
◽
Sensor Networks
◽
Wireless Sensor
◽
Optimal Resource
◽
Optimal Resource Management
Download Full-text
Efficient Group Key Management Protocol with One-Way Key Derivation
The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l
◽
10.1109/lcn.2005.61
◽
2005
◽
Cited By ~ 2
Author(s):
Jen-Chiun Lin
◽
Feipei Lai
◽
Hung-Chang Lee
Keyword(s):
Key Management
◽
Group Key Management
◽
Group Key
◽
Management Protocol
◽
Key Management Protocol
◽
Key Derivation
Download Full-text
Redundant Protection Problem in the Hierarchical GMPLS Networks
The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l
◽
10.1109/lcn.2005.115
◽
2005
◽
Author(s):
Sung-eok Jeon
Download Full-text
On the feasibility of utilizing correlations between user populations for traffic inference
The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l
◽
10.1109/lcn.2005.97
◽
2005
◽
Author(s):
Kun-chan Lan
◽
J. Heidemann
Download Full-text
Delay-Centric Link Quality Aware OLSR
The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l
◽
10.1109/lcn.2005.49
◽
2005
◽
Author(s):
Keun Jae Lee
◽
Min Soo Kim
◽
Song Yean Cho
◽
Byung In Mun
Keyword(s):
Link Quality
Download Full-text
Performance analysis of scalable certificate revocation schemes for ad hoc networks
The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l
◽
10.1109/lcn.2005.105
◽
2005
◽
Cited By ~ 8
Author(s):
S. Eichler
◽
B. Muller-Rathgeber
Keyword(s):
Performance Analysis
◽
Ad Hoc Networks
◽
Ad Hoc
◽
Certificate Revocation
◽
Hoc Networks
Download Full-text
A Remote User Authentication Scheme Using Strong Graphical Passwords
The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l
◽
10.1109/lcn.2005.16
◽
2005
◽
Cited By ~ 4
Author(s):
Wei-Chi Ku
◽
Maw-Jinn Tsaur
Keyword(s):
User Authentication
◽
Authentication Scheme
◽
Graphical Passwords
◽
Remote User Authentication
◽
User Authentication Scheme
◽
Remote User
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close