DIKUL - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UL. For full access, REGISTER.

1
hits: 5
1.
  • A Sample Chat Application B... A Sample Chat Application Based on JXTA
    Mekki, R.; Fezza, R. Journal of applied sciences (Asian Network for Scientific Information), 11/2009, Volume: 9, Issue: 21
    Journal Article

    In this study, the application aims use Peer-to-Peer technology to perform bidirectional communication. As the web continues to grow in both content and the number of connected devices, Peer-to-Peer ...
Full text
Available for: UL
2.
  • Mutual authentication protocol to share files in cloud storage
    Nezhad, Seyed Farshad Hosseini; Parsamehr, Reza 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), 2016-Dec.
    Conference Proceeding

    Nowadays, with deployment of Cloud Computing and its facilities, many users are absorbed in it. People are not satisfied with Cloud's Security and they are afraid to migrate to Cloud environment. We ...
Full text
Available for: UL
3.
  • SecureESFS: Sharing Android External Storage Files in a Securer Way
    Liang, Shan; Wang, Yuewu; Lei, Lingguang ... 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
    Conference Proceeding

    As an essential component on Android devices, External Storage is frequently used for sharing files between different apps. Therefore, compared to Internal Storage, the access control on the External ...
Full text
Available for: UL
4.
  • A security monitoring metho... A security monitoring method for malicious P2P event detection
    Jung, Hyun Mi; Hwang, Il-Sun; Moon, Jeong-Kyung ... Peer-to-peer networking and applications, 05/2016, Volume: 9, Issue: 3
    Journal Article
    Peer reviewed

    Recently malicious code is spreading rapidly due to the use of P2P(peer to peer) file sharing. The malicious code distributed mostly transformed the infected PC as a botnet for various attacks by ...
Full text
Available for: UL
5.
Full text

PDF

Load filters