Open Access System for Information Sharing

Login Library

 

Article
Cited 0 time in webofscience Cited 3 time in scopus
Metadata Downloads
Full metadata record
Files in This Item:
There are no files associated with this item.
DC FieldValueLanguage
dc.contributor.authorRoh B.-S-
dc.contributor.authorKwon O.-H-
dc.contributor.authorHong S.J-
dc.contributor.authorKim J.-
dc.date.accessioned2017-07-19T00:38:11Z-
dc.date.available2017-07-19T00:38:11Z-
dc.date.created2009-06-26-
dc.date.issued2008-01-
dc.identifier.issn0302-9743-
dc.identifier.urihttps://oasis.postech.ac.kr/handle/2014.oak/31210-
dc.languageEnglish-
dc.publisherSPRINGER-
dc.relation.isPartOfLECTURE NOTES IN COMPUTER SCIENCE-
dc.titleTHE EXCLUSION OF MALICIOUS ROUTING PEERS IN STRUCTURED P2P SYSTEMS-
dc.typeArticle-
dc.identifier.doi10.1007/978-3-540-79705-0_4-
dc.type.rimsART-
dc.identifier.bibliographicCitationLECTURE NOTES IN COMPUTER SCIENCE, v.4461, pp.43 - 43-
dc.citation.endPage43-
dc.citation.startPage43-
dc.citation.titleLECTURE NOTES IN COMPUTER SCIENCE-
dc.citation.volume4461-
dc.contributor.affiliatedAuthorKim J.-
dc.identifier.scopusid2-s2.0-47749109843-
dc.description.journalClass1-
dc.description.journalClass1-
dc.type.docTypeCONFERENCE PAPER-
dc.description.journalRegisteredClassscopus-

qr_code

  • mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher

김종KIM, JONG
Dept of Computer Science & Enginrg
Read more

Views & Downloads

Browse