Open Access System for Information Sharing

Login Library

 

Article
Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads
Full metadata record
Files in This Item:
There are no files associated with this item.
DC FieldValueLanguage
dc.contributor.authorRoh B.-Sko
dc.contributor.authorKwon O.-Hko
dc.contributor.authorHong S.Jko
dc.contributor.authorKim J.ko
dc.date.available2017-07-19T00:38:11Z-
dc.date.created2009-06-26-
dc.date.issued2008-01-
dc.identifier.citationLECTURE NOTES IN COMPUTER SCIENCE, v.4461, pp.43 - 43-
dc.identifier.issn0302-9743-
dc.identifier.urihttp://oasis.postech.ac.kr/handle/2014.oak/31210-
dc.languageEnglish-
dc.publisherSPRINGER-
dc.titleTHE EXCLUSION OF MALICIOUS ROUTING PEERS IN STRUCTURED P2P SYSTEMS-
dc.typeArticle-
dc.type.rimsART-
dc.contributor.localauthorKim J.-
dc.contributor.nonIdAuthorRoh B.-S-
dc.contributor.nonIdAuthorKwon O.-H-
dc.contributor.nonIdAuthorHong S.J-
dc.citation.endPage43-
dc.citation.startPage43-
dc.citation.titleLECTURE NOTES IN COMPUTER SCIENCE-
dc.citation.volume4461-
dc.identifier.scopusid2-S2.0-47749109843-
dc.description.journalClass1-

qr_code

  • mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher

김종KIM, JONG
Dept of Computer Science & Enginrg
Read more

Views & Downloads

Browse