Full metadata record
DC Field | Value | Language |
dc.contributor.author | Roh B.-S | - |
dc.contributor.author | Kwon O.-H | - |
dc.contributor.author | Hong S.J | - |
dc.contributor.author | Kim J. | - |
dc.date.accessioned | 2017-07-19T00:38:11Z | - |
dc.date.available | 2017-07-19T00:38:11Z | - |
dc.date.created | 2009-06-26 | - |
dc.date.issued | 2008-01 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | https://oasis.postech.ac.kr/handle/2014.oak/31210 | - |
dc.language | English | - |
dc.publisher | SPRINGER | - |
dc.relation.isPartOf | LECTURE NOTES IN COMPUTER SCIENCE | - |
dc.title | THE EXCLUSION OF MALICIOUS ROUTING PEERS IN STRUCTURED P2P SYSTEMS | - |
dc.type | Article | - |
dc.identifier.doi | 10.1007/978-3-540-79705-0_4 | - |
dc.type.rims | ART | - |
dc.identifier.bibliographicCitation | LECTURE NOTES IN COMPUTER SCIENCE, v.4461, pp.43 - 43 | - |
dc.citation.endPage | 43 | - |
dc.citation.startPage | 43 | - |
dc.citation.title | LECTURE NOTES IN COMPUTER SCIENCE | - |
dc.citation.volume | 4461 | - |
dc.contributor.affiliatedAuthor | Kim J. | - |
dc.identifier.scopusid | 2-s2.0-47749109843 | - |
dc.description.journalClass | 1 | - |
dc.description.journalClass | 1 | - |
dc.type.docType | CONFERENCE PAPER | - |
dc.description.journalRegisteredClass | scopus | - |
- Files in This Item:
- There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.