Author of the publication

GridSec: Trusted Grid Computing with Security Binding and Self-defense Against Network Worms and DDoS Attacks.

, , , , , , , and . International Conference on Computational Science (3), volume 3516 of Lecture Notes in Computer Science, page 187-195. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GossipTrust for Fast Reputation Aggregation in Peer-to-Peer Networks., , and . IEEE Trans. Knowl. Data Eng., 20 (9): 1282-1295 (2008)Proteus: A System for Dynamically Composing and Intelligently Executing Web Services., , , , , , , , , and 3 other author(s). ICWS, page 17-21. CSREA Press, (2003)PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing., and . IEEE Trans. Parallel Distributed Syst., 18 (4): 460-473 (2007)A Global X-Bone for Network Experiments., , , , , and . TRIDENTCOM, page 194-203. IEEE Computer Society, (2005)GridSec: Trusted Grid Computing with Security Binding and Self-defense Against Network Worms and DDoS Attacks., , , , , , , and . International Conference on Computational Science (3), volume 3516 of Lecture Notes in Computer Science, page 187-195. Springer, (2005)NAM: A Network Adaptable Middleware to Enhance Response Time of Web Services., , , , and . Int. J. Web Serv. Res., 2 (4): 1-21 (2005)NAM: A Network Adaptable Middleware to Enhance Response Time of Web Services., , , and . MASCOTS, page 136-. IEEE Computer Society, (2003)Optimal Placement of Virtual Masses for Structural Damage Identification., , , , and . Sensors, 19 (2): 340 (2019)Multi-level voxel representations for digital twin models of tunnel geological environment., , , , , , , , , and 1 other author(s). Int. J. Appl. Earth Obs. Geoinformation, (2022)Trusted P2P Transactions with Fuzzy Reputation Aggregation., , , and . IEEE Internet Comput., 9 (6): 24-34 (2005)