Browsing by Author Hoang, D

0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 22 to 39 of 39< previous 
Issue DateTitleAuthor(s)
2-May-2018MLAMAN: a novel multi-level authentication model and protocol for preventing wormhole attack in mobile ad hoc networkVo, TT; Luong, NT; Hoang, D
12-Nov-2009Network security considerations for a new generation protocol UDTBernardo, DV; Hoang, D
1-Dec-2005Network support for distributed Web servicesYousef, B; Hoang, D; Thamsakorn, P; Le, H; Chan, J
19-Oct-2009A new security scheme for E-health systemLi, W; Hoang, D
23-Aug-2016A novel Hash-Based File Clustering scheme for efficient distributing, storing and retrieving of large scale Health RecordsDang, TD; Hoang, D; Nanda, P
1-Jan-2016A novel hash-based file clustering scheme for efficient distributing, storing, and retrieving of large scale health recordsDang, TD; Hoang, D; Nanda, P
1-Dec-2005An optimised geographically-aware overlay networkLe, H; Hoang, D; Simmonds, A
22-Nov-2006PARM: A Physically-Aware Reference Model for Overlay InternetworkingLe, H; Hoang, D; Simmonds, A
1-Dec-2008A pervasive tele-health system for continual and low intrusive monitoring using peer-to-peer networksLe, H; Schiff, N; Plessis, JD; Hoang, D
1-Jan-2002Practical active network services within content-aware gatewaysSubramanian, S; Wang, P; Durairaj, R; Rasimas, J; Travostino, F; Lavian, T; Hoang, D
1-Dec-2010Protecting next generation high speed network protocol - UDT through generic security service application program interface - GSS-APIBernardo, DV; Hoang, D
1-Dec-2009Quantitative Security Risk Assessment (SRA) method: An empirical case studyBernardo, DV; Chua, BB; Hoang, D
2002Resource Allocating for Video-on-Demand with Delayed Multicast ProtocolNguyen, DNC; Hoang, D; Symvonis, A; NA
25-Sep-2008S-Web: An efficient and self-organizing wireless sensor network modelLe, H; Hoang, D; Poliah, R
20-Jul-2010Security analysis of the proposed practical security mechanisms for high speed data transfer protocolBernardo, DV; Hoang, D
12-Sep-2005A self-organising model for topology-aware overlay formationLe, H; Hoang, D; Simmonds, A
12-Sep-2013Visual analytics for intrusion detection in spam emailsZhang, J; Huang, ML; Hoang, D
1-Jan-2007Wireless technologies and architectures for health monitoring systemsHoang, D