Oтрасли промышленности и ремесла для изготовления и обработки различных изделий - 68

Научные статьи

В разделе "Oтрасли промышленности и ремесла для изготовления и обработки различных изделий"
An Overview of Vertical Handoff Decision Making Algorithms
Security Analysis and Performance Evaluation of Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers
Importance of S-Blocks in Modern Block Ciphers
Securing Zone Routing Protocol in Ad-Hoc Networks
Constraint Based Periodicity Mining in Time Series Databases
Impact of Model Mobility in Ad Hoc Routing Protocols
Application of Artificial Neural Network for Clutter Rejection
Adaptive Steganography: A survey of Recent Statistical Aware Steganography Techniques
An Effective and Secure Cipher Based on SDDO
Data Sharing for Context-Sensitive Access Control Policy Evaluation and Enforcement
Analysis and Evaluating Security of Component-Based Software Development: A Security Metrics Framework
Extended Queue Management Backward Congestion Control Algorithms for Web Transfers in Wireless Environment
Performance Analysis of Black Hole Attack in Vanet
A New 512 Bit Cipher for Secure Communication
Software Activation Using Multithreading
Swarm Flooding Attack against Directed Diffusion in Wireless Sensor Networks
Threshold Based Kernel Level HTTP Filter (TBHF) for DDoS Mitigation
Performance of TCP Vegas, Bic and Reno Congestion Control Algorithms on Iridium Satellite Constellations
Need of Removing Delivered Message Replica from Delay Tolerant Network - A Problem Definition
Security Mechanisms to Decrease Vulnerability of Ad-hoc Routing Protocols
Exponential Brute-Force Complexity of A Permutation Based Stream Cipher
Hybrid Model for Location Privacy in Wireless Ad-Hoc Networks
Performance Comparison and Evaluation of Different Multipath Routing Protocols Based on Various Scenario and Traffic Patterns for Mobile AD Hoc Networks
Effective Congestion Avoidance Scheme for Mobile Ad Hoc Networks
Implementation of An Optimized and Pipelined Combinational Logic Rijndael S-Box on FPGA
Performance Evaluation of Security-Throughput Tradeoff with Channel Adaptive Encryption
An Efficient Novel Key Management Scheme for Enhancing User Authentication in A WSN
Blactr: A Technique to Revoke the Misbehaving Users with TTP
FPGA Based A New Low Power and Self-Timed AES 128-bit Encryption Algorithm for Encryption Audio Signal
Digital Image Scrambling Based on Two Dimensional Cellular Automata
A Practical Privacy Preserving E-Voting Scheme with Smart Card Using Blind Signature
Study the One-bit Hard Combination Scheme on Cognitive Radio Users
Rigorous Progress on Algorithms Based Routing and Wavelength Assignment in Trans-Egypt Network (TEGYNET)Management
Reinforcement Swap Attack against Directed Diffusion in Wireless Sensor Networks
A Comparative Study of Power Consumption Models for CPA Attack
Generation of An Efficient Digital Watermark Key Based on Honey Comb Polynomial Interpolation Approach
User's Profile Replication Tree and On Demand Replica Update in Wireless Communication
Statistical Hiding Fuzzy Commitment Scheme for Securing Biometric Templates
A Novel Routing Scheme for Mobile Ad Hoc Network
Optimizing the CMTS to Improve Quality of Service in Next Generation Networks based on ACO Algorithm