Conference paper
A privacy-protecting coupon system
Liqun Chen, Matthias Enzmann, et al.
FC 2005
The iSCSI protocol specifies how to access SCSI storage devices over a TCP network. In this article we give a brief introduction to the iSCSI protocol and a brief comparison with alternative technologies. We then discuss the basic features of the iSCSI protocol: sessions, naming, discovery, security, data placement, and recovery.
Liqun Chen, Matthias Enzmann, et al.
FC 2005
Robert C. Durbeck
IEEE TACON
Xiaozhu Kang, Hui Zhang, et al.
ICWS 2008
Elizabeth A. Sholler, Frederick M. Meyer, et al.
SPIE AeroSense 1997