共 50 条
- [41] Secure Data Management in P2P Social Networks Using Access Tokens 2018 14TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2018, : 500 - 505
- [42] PJ-Sec: secure node joining in mobile P2P networks CCF Transactions on Pervasive Computing and Interaction, 2021, 3 : 13 - 24
- [44] Towards a P2P Mobile Contents Trading 2015 49TH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, 2015, : 338 - 342
- [45] Secure and Verifiable P2P Card Games EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 344 - 349
- [46] PLI: A new framework to protect digital content for P2P networks APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 : 206 - 216
- [47] SERVICE ORIENTED P2P NETWORKS FOR DIGITAL LIBRARIES, BASED ON JXTA ICSOFT 2009: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE AND DATA TECHNOLOGIES, VOL 2, 2009, : 141 - 146
- [49] Risk management of digital certificates in ad hoc and P2P networks 2008 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-4, 2008, : 312 - 317
- [50] P2P Honeypot to prevent illegal or harmful contents from spreading in P2P network 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 497 - +