Oтрасли промышленности и ремесла для изготовления и обработки различных изделий - 68

Научные статьи

В разделе "Oтрасли промышленности и ремесла для изготовления и обработки различных изделий"
Block Based Symmetry Key Visual Cryptography
Satyendra Nath Mandal, Subhankar Dutta, Ritam Sarkar
An Overview of Vertical Handoff Decision Making Algorithms
A. Bhuvaneswari, E. George Dharma Prakash Raj
Security Analysis and Performance Evaluation of Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers
Raman Kumar, Harsh Kumar Verma, Renu Dhir
Importance of S-Blocks in Modern Block Ciphers
Lisitskaya I.V., Melnychuk E.D., Lisitskiy K.E.
Securing Zone Routing Protocol in Ad-Hoc Networks
Ibrahim S. I. Abuhaiba, Hanan M. M. Abu-Thuraia
Constraint Based Periodicity Mining in Time Series Databases
Ramachandra.V.Pujeri, G.M.Karthik
Impact of Model Mobility in Ad Hoc Routing Protocols
TAHAR ABBES Mounir, Senouci Mohamed, Kechar Bouabdellah
Application of Artificial Neural Network for Clutter Rejection
Priyabrata Karmakar, Sourav Dhar, Mithun Chakraborty, Tirthankar Paul
Adaptive Steganography: A survey of Recent Statistical Aware Steganography Techniques
Manish Mahajan, Navdeep Kaur
An Effective and Secure Cipher Based on SDDO
Bac Do Thi, Minh Nguyen Hieu, Duy Ho Ngoc
Data Sharing for Context-Sensitive Access Control Policy Evaluation and Enforcement
Hassan Rasheed
Analysis and Evaluating Security of Component-Based Software Development: A Security Metrics Framework
Irshad Ahmad Mir, S.M.K Quadri
Extended Queue Management Backward Congestion Control Algorithms for Web Transfers in Wireless Environment
V.Sinthu Janita Prakash, D.I.George Amalarethinam, E.George Dharma Prakash Raj
Performance Analysis of Black Hole Attack in Vanet
Vimal Bibhu, Kumar Roshan, Kumar Balwant Singh, Dhirendra Kumar Singh
A New 512 Bit Cipher for Secure Communication
M. Anand Kumar, S.Karthikeyan
Software Activation Using Multithreading
Jianrui Zhang, Mark Stamp
Swarm Flooding Attack against Directed Diffusion in Wireless Sensor Networks
Ibrahim S. I. Abuhaiba, Huda B. Hubboub
Threshold Based Kernel Level HTTP Filter (TBHF) for DDoS Mitigation
Mohamed Ibrahim AK, Lijo George, Kritika Govind, S. Selvakumar
Performance of TCP Vegas, Bic and Reno Congestion Control Algorithms on Iridium Satellite Constellations
M.Nirmala, Ramachandra.V.Pujeri
Need of Removing Delivered Message Replica from Delay Tolerant Network - A Problem Definition
Harminder Singh Bindra, A L Sangal
Security Mechanisms to Decrease Vulnerability of Ad-hoc Routing Protocols
G.Sunayana, Sukrutharaj.M, Lalitha rani.N, M.B.Kamakshi
Exponential Brute-Force Complexity of A Permutation Based Stream Cipher
Mohammed Omari, Hamdy S. Soliman
Hybrid Model for Location Privacy in Wireless Ad-Hoc Networks
IBalasaheb N. Jagdale, Nileema S. Gawande
Performance Comparison and Evaluation of Different Multipath Routing Protocols Based on Various Scenario and Traffic Patterns for Mobile AD Hoc Networks
P.Periyasamy, E.Karthikeyan
Effective Congestion Avoidance Scheme for Mobile Ad Hoc Networks
S.Sheeja, Ramachandra.V.Pujeri
Implementation of An Optimized and Pipelined Combinational Logic Rijndael S-Box on FPGA
Bahram Rashidi, Bahman Rashidi
Performance Evaluation of Security-Throughput Tradeoff with Channel Adaptive Encryption
Poonam Jindal, Brahmjit Singh
An Efficient Novel Key Management Scheme for Enhancing User Authentication in A WSN
Harjot Bawa, Parminder Singh, Rakesh Kumar
Blactr: A Technique to Revoke the Misbehaving Users with TTP
H.Jayasree, A. Damodaram
FPGA Based A New Low Power and Self-Timed AES 128-bit Encryption Algorithm for Encryption Audio Signal
Bahram Rashidi, Bahman Rashidi
Digital Image Scrambling Based on Two Dimensional Cellular Automata
Fasel Qadir, M. A. Peer, K. A. Khan
A Practical Privacy Preserving E-Voting Scheme with Smart Card Using Blind Signature
V.K. Narendira Kumar, B. Srinivasan
Study the One-bit Hard Combination Scheme on Cognitive Radio Users
Md. Shamim Hossain, Mohammad Mamunur Rashid, Md. Nazrul Islam, Md. Abdullah-Al-Mashud, Md. Nurul Islam
Rigorous Progress on Algorithms Based Routing and Wavelength Assignment in Trans-Egypt Network (TEGYNET)Management
Abd El–Naser A. Mohammed, Ahmed Nabih Zaki Rashed, Osama S. Fragallah, Mohamed G. El-Abyad
Reinforcement Swap Attack against Directed Diffusion in Wireless Sensor Networks
Ibrahim S. I. Abuhaiba, Huda B. Hubboub
A Comparative Study of Power Consumption Models for CPA Attack
Hassen Mestiri, Noura Benhadjyoussef, Mohsen Machhout, Rached Tourki
Generation of An Efficient Digital Watermark Key Based on Honey Comb Polynomial Interpolation Approach
G.RoslineNesakumari, V.Vijayakumar, B.V.Ramana Reddy
User's Profile Replication Tree and On Demand Replica Update in Wireless Communication
Prem Nath, Chiranjeev Kumar
Statistical Hiding Fuzzy Commitment Scheme for Securing Biometric Templates
Alawi A. Al-Saggaf, Haridas Acharya
A Novel Routing Scheme for Mobile Ad Hoc Network
Prem Chand, M.K.Soni