Войти
Регистрация
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Прикладные науки. Медицина. Технология
Oтрасли промышленности и ремесла для изготовления и обработки различных изделий - 68
Научные статьи
В разделе "Oтрасли промышленности и ремесла для изготовления и обработки различных изделий"
Role of Mobile Agents in the Layered Architecture of Mobile Ad-hoc Networks
A Novel Approach for Optimization Auto-Scaling in Cloud Computing Environment
Multiple Information Hiding using Cubical Approach on Random Grids
Performance Evaluation of AODV and GOD for Qos Aware Applications through Realistic Conditions in VANET
An Innovative Approach for Video Steganography
Performance Analysis of VOIP over GRE Tunnel
The New Block Cipher Design (Tigris Cipher)
Optimization of Value of Parameters in Ad-hoc on Demand Multipath Distance Vector Routing Using Magnetic Optimization Algorithm
Quality Evaluation of Mobile Networks Using VoIP Applications: A Case Study with Skype and LINE based-on Stationary Tests in Bangkok
Enhanced Voting based Secure Localization for Wireless Sensor Networks
FPGA Implementation of Secure Force (64-Bit) Low Complexity Encryption Algorithm
Performance Analysis of Anti-Phishing Tools and Study of Classification Data Mining Algorithms for a Novel Anti-Phishing System
Secure Model for SMS Exchange over GSM
Dynamic and Real-time Sleep Schedule Protocols for Energy Efficiency in WSNs
Energy Conscious based Multipath Routing Algorithm in WSN
Intrusion Detection with Multi-Connected Representation
An Intrusion Detection and Prevention System based on Automatic Learning of Traffic Anomalies
Context-Sensitive Grammars and Linear-Bounded Automata
Performance Evaluation of IPv4/IPv6 Transition Mechanisms
Taxonomy of SSL/TLS Attacks
Modified LEACH-DT Algorithm with Hierarchical Extension for Wireless Sensor Networks
CEAACK – A Reduced Acknowledgment for Better Data Transmission for MANETs
Predict Link Failure in AODV Protocol to provide Quality of Service in MANET
Optimized Communication of Group Mobility in WPAN
Buffering Strategies in Optical Packet Switching
Double Layer Image Security System using Encryption and Steganography
Analysis of Cryptographic Protocols AKI, ARPKI and OPT using ProVerif and AVISPA
A Stable Backbone-Based on Demand Multipath Routing Protocol for Wireless Mobile Ad Hoc Networks
An Analysis of Link Disjoint and Node Disjoint Multipath Routing for Mobile Ad Hoc Network
A Throughput and Spectrum Aware Fuzzy Logic Based Routing Protocol for CRN
Low Complexity Multimedia Encryption
Copyright Protection for Digital Images using Singular Value Decomposition and Integer Wavelet Transform
The Scalability and Stability Analysis of KLEACH Routing Protocol in Wireless Sensor Networks
Adaptive Weighted Clustering Algorithm for Mobile Ad-hoc Networks
Formal Verification of NTRUEncrypt Scheme
Efficient Scalar Multiplication over Elliptic Curve
A Note on Group Authentication Schemes
Evaluation of Message Dissemination Techniques in Vehicular Ad Hoc Networks using Node Movement in Real Map
A Review on Multiple Survey Report of Cloud Adoption and its Major Barriers in the Perspective of Bangladesh
Stochastic RA-Network for the Nodes Functioning Analysis in the Distributed Computer Systems
← Предыдущая
Следующая страница →
1
|
...
|
59
|
60
|
61
|
62
|
63
|
64
|
65
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.