[{"title":"( 18 个子文件 22.46MB ) 基于区块链的网络安全技术综述(论文)","children":[{"title":"Communication-network-requirements-for-major-smart-grid-app_2014_Computer-Ne.pdf <span style='color:#111;'> 1.02MB </span>","children":null,"spread":false},{"title":"Learning-solutions-for-auction-based-dynamic-spectrum-acces_2014_Computer-Ne.pdf <span style='color:#111;'> 1.13MB </span>","children":null,"spread":false},{"title":"RTXP--A-localized-real-time-MAC-routing-protocol-for-wirel_2014_Computer-Net.pdf <span style='color:#111;'> 2.89MB </span>","children":null,"spread":false},{"title":"VirtualKnotter--Online-virtual-machine-shuffling-for-congest_2014_Computer-N.pdf <span style='color:#111;'> 1.03MB </span>","children":null,"spread":false},{"title":"Surveillance-on-the-road--Vehicular-tracking-and-reporting_2014_Computer-Net.pdf <span style='color:#111;'> 2.07MB </span>","children":null,"spread":false},{"title":"Energy-efficiency-in-wireless-sensor-networks--A-top-dow_2014_Computer-Netwo.pdf <span style='color:#111;'> 2.13MB </span>","children":null,"spread":false},{"title":"Banking-on-interoperability--Secure--interoperable-creden_2014_Computer-Netw.pdf <span style='color:#111;'> 2.49MB </span>","children":null,"spread":false},{"title":"Handover-rate-based-dynamic-guard-bandwidth-allocation-method-f_2014_Compute.pdf <span style='color:#111;'> 1.40MB </span>","children":null,"spread":false},{"title":"Adding-accurate-timestamping-capability-to-wireless-networ_2014_Computer-Net.pdf <span style='color:#111;'> 977.23KB </span>","children":null,"spread":false},{"title":"Scalable-RFID-security-framework-and-protocol-supporting-I_2014_Computer-Net.pdf <span style='color:#111;'> 2.04MB </span>","children":null,"spread":false},{"title":"A-multi-hop-resource-scheduling-algorithm-for-IEEE-802-16_2014_Computer-Netw.pdf <span style='color:#111;'> 3.33MB </span>","children":null,"spread":false},{"title":"Editorial-Board_2014_Computer-Networks.pdf <span style='color:#111;'> 23.90KB </span>","children":null,"spread":false},{"title":"Optimizing-the-design-parameters-of-threshold-pool-mixes-f_2014_Computer-Net.pdf <span style='color:#111;'> 1.96MB </span>","children":null,"spread":false},{"title":"Sink-discovery-in-location-free-and-mobile-sink-wireless-_2014_Computer-Netw.pdf <span style='color:#111;'> 2.55MB </span>","children":null,"spread":false},{"title":"Distributed-system-for-private-web-search-with-untrusted_2014_Computer-Netwo.pdf <span style='color:#111;'> 965.92KB </span>","children":null,"spread":false},{"title":"Client-server-games-and-their-equilibria-in-peer-to-peer_2014_Computer-Netwo.pdf <span style='color:#111;'> 1.18MB </span>","children":null,"spread":false},{"title":"A-hybrid-procedure-for-efficient-link-dimensioning_2014_Computer-Networks.pdf <span style='color:#111;'> 1.85MB </span>","children":null,"spread":false},{"title":"Novel-methods-for-virtual-network-composition_2014_Computer-Networks.pdf <span style='color:#111;'> 1.42MB </span>","children":null,"spread":false}],"spread":true}]