About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
CHINACOM 2008
ChinaCom2008-NIS 2008ChinaCom2008-OCN 2008ChinaCom2008-FCN 2008ChinaCom2008-WCN 2008ChinaCom2008-MCS 2008ChinaCom2008-Industrial 2008MUSIC 2008ChinaCom2008-AIS 2008ChinaCom2008-DBMC 2008COGCOM 2008ChinaCom2008-SPC 2008COMNETS 2008ChinaCom2008-ICT 2008
Other Years
Ethics and Malpractice Statement

    ChinaCom2008-NIS

    ChinaCom2008-Network and Information Security Symposium

    NIS: Networking and Information Security Symposium

    NIS: Networking and Information Security Symposium

    more »
    Editor(s): Jian Chu (Zhejiang University, China) and Andreas Molisch (MERL, USA and Lund University, Sweden)
    Publisher
    IEEE
    ISBN
    978-1-4244-2373-6
    Conference dates
    25th–28th Aug 2008
    Location
    Hangzhou, China
    Appeared in EUDL
    2011-11-29

    Copyright © 2011–2025 IEEE

    Ordered by title or year
    Showing 1–10 of 16 results
    Page size: 102550
    • 1
    • 2
    • Next
    • Last
    • A Measurement Study of PPStream

      Research Article in ChinaCom2008-Network and Information Security Symposium

      Xiao Su, Linan Chang
    • A Multiple Regular Expressions Matching Architecture for Network Intrusion Detection System

      Research Article in ChinaCom2008-Network and Information Security Symposium

      Wei Zhang, Tian Song, Dongsheng Wang
    • A Pi2HC Mechanism against DDoS Attacks

      Research Article in ChinaCom2008-Network and Information Security Symposium

      Guang Jin, Yuan Li, Huizhan Zhang, Jiangbo Qian
    • A Secure Recommendation-Based Reputation System for Node Incentive Cooperation

      Research Article in ChinaCom2008-Network and Information Security Symposium

      kun wang, meng wu, subin shen
    • A Token Free Password Authentication Scheme with Multiple Key Agreements

      Research Article in ChinaCom2008-Network and Information Security Symposium

      Chin-Chen Chang, Hao-Chuan Tsai, Shi-Yi Lin
    • A Word-Oriented Stream Cipher For 3rd Generation: TAIYI

      Research Article in ChinaCom2008-Network and Information Security Symposium

      Guang Zeng, Wenbao Han, Kaicheng He, Zheng Wang
    • An Efficient Authentication Protocol of WLAN and its Security Proof

      Research Article in ChinaCom2008-Network and Information Security Symposium

      Haojun Zhang, Li Chen
    • An Improved l-Diversity Model for Numerical Sensitive Attributes

      Research Article in ChinaCom2008-Network and Information Security Symposium

      Jianmin Han, Huiqun Yu, Juan Yu
    • Defending Wormhole Attack in APS DV-hop

      Research Article in ChinaCom2008-Network and Information Security Symposium

      ZHU Bin, Liao Jun`guo, ZHANG Huifu
    • Efficiently detecting wormhole attacks in sensor networks by information potential

      Research Article in ChinaCom2008-Network and Information Security Symposium

      Qin Li, Qingkai Zeng
    • 1
    • 2
    • Next
    • Last
    EBSCOProQuestDBLPDOAJPortico
    EAI Logo

    About EAI

    • Who We Are
    • Leadership
    • Research Areas
    • Partners
    • Media Center

    Community

    • Membership
    • Conference
    • Recognition
    • Sponsor Us

    Publish with EAI

    • Publishing
    • Journals
    • Proceedings
    • Books
    • EUDL