Войти
Регистрация
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Прикладные науки. Медицина. Технология
Oтрасли промышленности и ремесла для изготовления и обработки различных изделий - 68
Научные статьи
В разделе "Oтрасли промышленности и ремесла для изготовления и обработки различных изделий"
Efficient Hand off using Fuzzy and Simulated Annealing
A Chaos-based Image Encryption Scheme Using 3D Skew Tent Map and Coupled Map Lattice
Enhancing Hash Function Selection Techniques Based on Message Contents
Hardware Implementation of Elliptic Curve Cryptography over Binary Field
Improved Multi-Path and Multi-Speed Routing Protocol in Wireless Sensor Networks
Error Detection & Correction in Wireless Sensor Networks By Using Residue Number Systems
A Novel Security Scheme for Secret Data using Cryptography and Steganography
Fast Vertical Handover Algorithm for Vehicular Communication: A Holistic Approach
Free Space Optical Channel Characterization and Modeling with Focus on Algeria Weather Conditions
Attacks Due to Flaw of Protocols Used In Network Access Control (NAC), Their Solutions and Issues: A Survey
Investigations of Cellular Automata Linear Rules for Edge Detection
Intelligent Wireless Sensor Network System to shrink Suspected Terror from Militants
A Packet Routing Model for Computer Networks
An Enhanced Dynamic Mutual Authentication Scheme for Smart Card Based Networks
Asymptotic Stability Analysis of E-speed Start Congestion Control Protocol for TCP
A Hierarchical Load Balancing Policy for Grid Computing Environment
Battering Keyloggers and Screen Recording Software by Fabricating Passwords
IEATH: Improved Energy Aware and Two Hop Multipath Routing Protocol in Wireless Sensor Networks
Congestion Control in 4G Wireless Networks Using Coalition Game
A Modified Hill Cipher using Randomized Approach
An Analytical Assessment on Document Clustering
QSWMCA - Quality of Service in Wireless Mesh Networks by Configuration Arguments
Privacy Notions and Review of Privacy Preservation Mechanisms in Wireless Sensor Networks
Multi-User Quantum Key Distribution Using Wavelength Division Multiplexing
Preventive Aspect of Black Hole Attack in Mobile AD HOC Network
Dynamic Inter Arrival Time Based Seamless Handoff for Mobile WIMAX Ping-Pong Calls Bypassing PKMv2 EAP Authentication
UML Based Integrated Multilevel Checkpointing Algorithms for Cloud Computing Environment
Protection Against DDoS and Data Modification Attack in Computational Grid Cluster Environment
Image Encryption Using Chaotic Map and Block Chaining
A Robust Image Steganography using DWT Difference Modulation (DWTDM)
An Efficient Chaos-based Image Encryption Scheme Using Affine Modular Maps
Impact of Physical Layer Jamming on Wireless Sensor Networks with Shadowing and Multicasting
Application of Biometrics in Mobile Voting
Estimating the Video Registration Using Image Motions
Cryptography Using Multiple Two-Dimensional Chaotic Maps
A New Approach for Multicast Routing in Wireless Mesh Networks
Mining Data Streams using Option Trees
Enhancement of Security and Privacy in Biometric Passport Inspection System Using Face, Fingerprint, and Iris Recognition
Methodology for Benchmarking IPsec Gateways
Block Based Symmetry Key Visual Cryptography
← Предыдущая
Следующая страница →
1
|
...
|
53
|
54
|
55
|
56
|
57
|
58
|
59
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.