Journal: Computer Communications

Volume 29, Issue 3

279 -- 0Brian Neil Levine, Clay Shields. Internet security
280 -- 290John W. Byers, Jeffrey Considine, Gene Itkis, Mei Chin Cheng, Alex Yeung. Securing bulk content almost for free
291 -- 305T. Perlines Hormann, Konrad Wrona, S. Holtmanns. Evaluation of certificate validation mechanisms
306 -- 324Dogan Kesdogan, Charles Palmer. Technical challenges of network anonymity
325 -- 336Panayiotis Kotzanikolaou, Rosa Mavropodi, Christos Douligeris, Vassilios Chrissikopoulos. Secure distributed intelligent networks
337 -- 357Dario Di Sorte, Mauro Femminella, Leonardo Piacentini, Gianluca Reali. Target access router selection in advanced mobility scenarios
358 -- 371Shiann-Tsong Sheu, Yun-Yen Shih, Yue-Ru Chuang. An ACK-based polling strategy for supporting high performance and QoS in IEEE 802.11 wireless networks
372 -- 391Athanasios Drigas, S. Kouremenos, Y. Bakopoulos, Vassilis Loumos. A study of H.263 traffic modeling in multipoint videoconference sessions over IP networks
392 -- 401Gang Cheng, Nirwan Ansari. Finding a least hop(s) path subject to multiple additive constraints
402 -- 408Ajay Pal Singh Virk, Raouf Boutaba. Economical protection in MPLS networks