Ads
-
Related paper
- A hybrid IP Trace Back Scheme Using Integrate Packet logging with hash Table under Fixed Storage?
- IP Trace Back Scheme for Packet Marking and Packet Logging Using RIHT?
- SECURE NETWORK USING RECTIFIED PROBABILISTIC PACKET MARKING BASED ON TRACE BACK DEFENSE AGAINST DDOS FLOODING ATTACKS
- Provable Data Possession Scheme based on Homomorphic Hash Function in Cloud Storage
- A security scheme based on blockchain and a hybrid cryptosystem to reduce packet loss in IoV
- Hybrid strategy for reliable packet transfer and packet loss reduction in cognitive radio Ad-Hoc Network
- An IP Traceback using Packet Logging&Marking Schemes for Path Reconstruction
- Aggressive Hash Table Predicated Social Analyze for Defended Cloud Cache
- A Real-time IP Packet Flow Match Algorithm Based on Two-layer XOR Hash and TCAM
- Security in Distributed Hash Table in Peer to Peer Protocols