Citation to this article as recorded by
Bahaman, N., A.S. Prabuwono, M.Z. Mas'ud and M.F. Abdollah, 2012. Effectiveness of security tools to anomalies on tunneled traffic. Inform. Technol. J., 11: 191-199. CrossRefDirect Link |
Citation to this article as recorded by
Effectiveness of Security Tools to Anomalies on Tunneled Traffic Information Technology Journal Vol. 11, Issue 2, 191, 2012 |
How to cite this article
Wei Huang and Bo Meng, 2011. Automated Proof of Resistance of Denial of Service Attacks in Remote Internet Voting Protocol with Extended Applied Pi Calculus. Information Technology Journal, 10: 1468-1483.
DOI: 10.3923/itj.2011.1468.1483
URL: https://scialert.net/abstract/?doi=itj.2011.1468.1483
DOI: 10.3923/itj.2011.1468.1483
URL: https://scialert.net/abstract/?doi=itj.2011.1468.1483