Digital Library
Search Results: [ keyword: Protection ] (39)
Liaoruo Huang,
Qingguo Shen,
Wenjuan Shao,
Vol. 11, No. 11, November 29, 2017
10.3837/tiis.2017.11.002
10.3837/tiis.2017.11.002
Zhaotian Li,
Yuesheng Zhu,
Guibo Luo,
Biao Guo,
Vol. 11, No. 7, July 30, 2017
10.3837/tiis.2017.07.014
10.3837/tiis.2017.07.014
Ya-Feng Di,
Chin-Feng Lee,
Zhi-Hui Wang,
Chin-Chen Chang,
Jianjun Li,
Vol. 10, No. 12, December 30, 2016
10.3837/tiis.2016.12.008
10.3837/tiis.2016.12.008
Junsong Zhang,
Lei He,
Qikun Zhang,
Yong Gan,
Vol. 10, No. 11, November 29, 2016
10.3837/tiis.2016.11.025
10.3837/tiis.2016.11.025
28.
Implementation of a Network Provisioning System with User-driven and Trusty Protection Management
Fu-Cai Zhou,
Mu-Qing Lin,
Yang Zhou,
Yu-Xi Li,
Vol. 9, No. 11, November 29, 2015
10.3837/tiis.2015.11.024
10.3837/tiis.2015.11.024