Войти
Регистрация
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Прикладные науки. Медицина. Технология
Oтрасли промышленности и ремесла для изготовления и обработки различных изделий - 68
Научные статьи
В разделе "Oтрасли промышленности и ремесла для изготовления и обработки различных изделий"
Object Authentication Using RFID Technology: A Multi-tag Approach
Fuzzy Based Energy Efficient Multiple Cluster Head Selection Routing Protocol for Wireless Sensor Networks
A Comparative Performance Analysis of Routing Protocols in MANET using NS3 Simulator
Embedded Real-Time HTTP Server
Ranking Grid-sites based on their Reliability for Successfully Executing Jobs of Given Durations
An Image Encryption Scheme Based on Hybrid Orbit of Hyper-chaotic Systems
Improving Security of the Baptista's Cryptosystem Using Two-step Logistic Map
Weighted Round Robin and Rate Limiter based Fair Queuing for WRR
Cumulative Techniques for Overcoming Security Threats in Manets
Load Balancing Early Handoff Scheme for Multimedia Data Transmission in Wireless Networks
Correlation Power Analysis using Measured and Simulated Power Traces based on Hamming Distance Power Model – Attacking 16-bit Integer Multiplier in FPGA
Efficient Traffic Engineering Strategies for Optimizing Network Throughput in WDM All-Optical Networks
Single Sign-On in Cloud Federation using CloudSim
ANM to Perceive and Thwart Denial of Service Attack in WLAN
SD-AREE-I Cipher: Amalgamation of Bit Manipulation, Modified VERNAM CIPHER & Modified Caesar Cipher (SD-AREE)
Advanced Steganography Algorithm Using Randomized Intermediate QR Host Embedded With Any Encrypted Secret Message: ASA_QR Algorithm
An Ultra-secure Router-to-router Spontaneous Key Exchange System
A Model for Detecting Tor Encrypted Traffic using Supervised Machine Learning
An Efficient Method to Audio Steganography based on Modification of Least Significant Bit Technique using Random Keys
Graph Structured Data Security using Trusted Third Party Query Process in Cloud Computing
A Survey on RC4 Stream Cipher
(N, N) Secret Color Image Sharing Scheme with Dynamic Group
Analysis of Base Station Assisted Novel Network Design Space for Edge-based WSNs
Genetic Centralized Dynamic Clustering in Wireless Sensor Networks
Destination Address Entropy based Detection and Traceback Approach against Distributed Denial of Service Attacks
Experimental Analysis of OLSR and DSDV Protocols on NS-2.35 in Mobile Ad-Hoc Networks
Hardware Implementation of Fidelity based On Demand Routing Protocol in MANETs
A Centralized Key Table based Communication Efficient Group Key Management Protocol
A 3-D Geometry based Remote Login 2-Way Authentication Scheme using Smart Card
A Secure Code-Based Authentication Scheme for RFID Systems
Intrusion Detection Based on Normal Traffic Specifications
Addressing the Bandwidth issue in End-to-End Header Compression over IPv6 Tunneling Mechanism
SMAODV: A Novel Smart Protocol for Routing in Ad-hoc Wireless Networks Using the PageRank Algorithm
A Cluster based Key Management Scheme for Underwater Wireless Sensor Networks
QoS Comparison of MANET Routing Protocols
Artificially Augmented Training for Anomaly-based Network Intrusion Detection Systems
Can universally composable cryptographic protocols be practical?
A Cross Layer for Detection and Ignoring Black Hole Attack in MANET
CUDA based Rabin-Karp Pattern Matching for Deep Packet Inspection on a Multicore GPU
Day-ahead Pricing Model for Smart Cloud using Time Dependent Pricing
← Предыдущая
Следующая страница →
1
|
...
|
58
|
59
|
60
|
61
|
62
|
63
|
64
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.