Oтрасли промышленности и ремесла для изготовления и обработки различных изделий - 68

Научные статьи

В разделе "Oтрасли промышленности и ремесла для изготовления и обработки различных изделий"
Microcontroller Based Home Security and Load Controlling Using Gsm Technology
Mustafijur Rahman, A.H.M Zadidul Karim, Sultanur Nyeem, Faisal Khan, Golam Matin
Object Authentication Using RFID Technology: A Multi-tag Approach
Subhasish Dhal, Indranil Sen Gupta
Fuzzy Based Energy Efficient Multiple Cluster Head Selection Routing Protocol for Wireless Sensor Networks
Sohel Rana, Ali Newaz Bahar, Nazrul Islam, Johirul Islam
A Comparative Performance Analysis of Routing Protocols in MANET using NS3 Simulator
Rakesh Kumar Jha, Pooja Kharga
Embedded Real-Time HTTP Server
Radosław Czarnecki, Stanislaw Deniziak
Ranking Grid-sites based on their Reliability for Successfully Executing Jobs of Given Durations
Farrukh Nadeem
An Image Encryption Scheme Based on Hybrid Orbit of Hyper-chaotic Systems
Junming Ma, Ruisong Ye
Improving Security of the Baptista's Cryptosystem Using Two-step Logistic Map
Balram Nitharwal, Mamta Rani, Hukam Chand Saini
Weighted Round Robin and Rate Limiter based Fair Queuing for WRR
Tomáš Balogh, Martin Medvecký
Cumulative Techniques for Overcoming Security Threats in Manets
Ajay Koul, Mamta Sharma
Load Balancing Early Handoff Scheme for Multimedia Data Transmission in Wireless Networks
Cheng-Wei Hu, Yung-Chung Wang, Jenn-Shing Wang
Correlation Power Analysis using Measured and Simulated Power Traces based on Hamming Distance Power Model – Attacking 16-bit Integer Multiplier in FPGA
Marek Repka, Michal Varchola
Efficient Traffic Engineering Strategies for Optimizing Network Throughput in WDM All-Optical Networks
Mohamed Koubàa, Naama Amdouni, Taoufik Aguili
Single Sign-On in Cloud Federation using CloudSim
Manoj V. Thomas, Anand Dhole, K. Chandrasekaran
ANM to Perceive and Thwart Denial of Service Attack in WLAN
Durairaj M, Persia A
SD-AREE-I Cipher: Amalgamation of Bit Manipulation, Modified VERNAM CIPHER & Modified Caesar Cipher (SD-AREE)
Somdip Dey
Advanced Steganography Algorithm Using Randomized Intermediate QR Host Embedded With Any Encrypted Secret Message: ASA_QR Algorithm
Somdip Dey, Kalyan Mondal, Joyshree Nath, Asoke Nath
An Ultra-secure Router-to-router Spontaneous Key Exchange System
Pramode K. Verma, Mayssaa El Rifai
A Model for Detecting Tor Encrypted Traffic using Supervised Machine Learning
Alaeddin Almubayed, Ali Hadi, Jalal Atoum
An Efficient Method to Audio Steganography based on Modification of Least Significant Bit Technique using Random Keys
Ali M. Meligy, Mohammed M. Nasef, Fatma T. Eid
Graph Structured Data Security using Trusted Third Party Query Process in Cloud Computing
Prakash G L, Manish Prateek, Inder Singh
A Survey on RC4 Stream Cipher
Poonam Jindal, Brahmjit Singh
(N, N) Secret Color Image Sharing Scheme with Dynamic Group
Mohamed Fathimal. P, Arockia Jansi Rani .P
Analysis of Base Station Assisted Novel Network Design Space for Edge-based WSNs
Muni Venkateswarlu K., A. Kandasamy, Chandrasekaran K.
Genetic Centralized Dynamic Clustering in Wireless Sensor Networks
Mekkaoui Kheireddine, Rahmoun Abdellatif, Gianluigi Ferrari
Destination Address Entropy based Detection and Traceback Approach against Distributed Denial of Service Attacks
Abhinav Bhandari, A.L Sangal, Krishan Kumar
Experimental Analysis of OLSR and DSDV Protocols on NS-2.35 in Mobile Ad-Hoc Networks
Shelja Sharma, Suresh Kumar Bhardwaj
Hardware Implementation of Fidelity based On Demand Routing Protocol in MANETs
Himadri N. Saha, Rohit Singh, Debika Bhattacharyya
A Centralized Key Table based Communication Efficient Group Key Management Protocol
Manisha Y. Joshi, Rajankumar S. Bichkar
A 3-D Geometry based Remote Login 2-Way Authentication Scheme using Smart Card
Hari Om, Vishavdeep Goyal, Kunal Gupta
A Secure Code-Based Authentication Scheme for RFID Systems
Noureddine Chikouche, Foudil Cherif, Pierre-Louis Cayrel, Mohamed Benmohammed
Intrusion Detection Based on Normal Traffic Specifications
Zeinab Heidarian, Naser Movahedinia, Neda Moghim, Payam Mahdinia
Addressing the Bandwidth issue in End-to-End Header Compression over IPv6 Tunneling Mechanism
Dipti Chauhan, Sanjay Sharma
SMAODV: A Novel Smart Protocol for Routing in Ad-hoc Wireless Networks Using the PageRank Algorithm
Ali Gozali, Keivan Borna
A Cluster based Key Management Scheme for Underwater Wireless Sensor Networks
Seema Verma, Prachi
QoS Comparison of MANET Routing Protocols
Tarunpreet Bhatia, A.K. Verma
Artificially Augmented Training for Anomaly-based Network Intrusion Detection Systems
Chockalingam Karuppanchetty, William Edmonds, Sun-il Kim, Nnamdi Nwanze
Can universally composable cryptographic protocols be practical?
István Vajda
A Cross Layer for Detection and Ignoring Black Hole Attack in MANET
Azza Mohammed, Boukli Hacene Sofiane, Faraoun kamel Mohamed
CUDA based Rabin-Karp Pattern Matching for Deep Packet Inspection on a Multicore GPU
Jyotsna Sharma, Maninder Singh