Войти
Регистрация
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Прикладные науки. Медицина. Технология
Oтрасли промышленности и ремесла для изготовления и обработки различных изделий - 68
Научные статьи
В разделе "Oтрасли промышленности и ремесла для изготовления и обработки различных изделий"
Performance Analysis and Enhancement of TCP in Presence of Jitter in Wireless Networks
An Improved Energy Aware Distributed Clustering Protocol for Wireless Sensor Networks
Clustering in Wireless Sensor Networks- A Survey
Application of Combinatory Mechanism on RTOS UFS ACM for Risk Optimization
Verifier-based Password Authenticated 3P-EKE Protocol using PCLA keys
Two Group Signature Schemes with Multiple Strategies Based on Bilinear Pairings
An Improved Hybrid Mechanism for Secure Data Communication
Improving the Performance of Routing Protocol using Genetic Algorithm
Spam Reduction by using E-mail History and Authentication (SREHA)
Password Security: An Analysis of Password Strengths and Vulnerabilities
Vertical Handoff Decision Algorithm Based on PRSS and Dwell Time
An Efficient Position based Power Aware Routing Algorithm in Mobile Ad-hoc Networks
Intrusion Detection System to Overcome a Novel Form of Replay Attack (Data Replay) in Wireless Sensor Networks
Multiresolution Fuzzy C-Means Clustering Using Markov Random Field for Image Segmentation
Realization of Efficient High Throughput Buffering Policies for Network on Chip Router
An Improved Active Shape Model Application onFacial Feature Localization
A Specialized Lightweight Metamorphic Function for KASUMI Metamorphic Cipher and Its FPGA Implementation
Vertical Handoff with Predictive Received Signal Strength in Next Generation Wireless Network
Security against Sample Pair Steganalysis in Eight Queens Data Hiding Technique
Empirical Performance Evaluation of Reactive Routing Protocols for Wireless Ad hoc Networks in Adversarial Environment
Cuckoo Genetic Optimization Algorithm for Efficient Job Scheduling with Load Balance in Grid Computing
A SCPS-NP Routing Algorithm Based on Mobile IP Routing
A Novel Scheme for Image Authentication and Secret Data Sharing
Honeypot System for Attacks on SSH Protocol
Alternative Equations for Guillou-Quisquater Signature Scheme
Low-power Wireless Pressure Transmitter and Net of Oil-well Based on Zigbee
Interaction of High Speed TCPs with Recent AQMs through Experimental Evaluation
Detection and Mitigation of Sybil Attack in Peer-to-peer Network
A Proxy based Framework for Efficient Range Query Processing in a Cellular Network
A Clientless Endpoint Authentication SchemeBased on TNC
An Improved Wavelet Filtering Algorithm and Its FPGA Implementation
32Still Image Compression Algorithm Based on Directional Filter Banks
Computational Independence in the Design of Cryptographic Protocols
Using String Kernel for Document Clustering
TempR: Application of Stricture Dependent Intelligent Classifier for Fast Flux Domain Detection
A New Approach for Remote User Authentication in a Multi - Server Environment Based on DYNAMIC-ID using SMART-CARD
Enhancing Data Security and Access Control in Cloud Environment using Modified Attribute Based Encryption Mechanism
Reliable and Power Efficient Routing Protocol for MANETs
A Cost-Aware Resource Selection for Dataintensive Applications in Cloud-oriented Data Centers
An Efficient Dimension Reduction Quantization Scheme for Speech Vocal Parameters
← Предыдущая
Следующая страница →
1
|
...
|
60
|
61
|
62
|
63
|
64
|
65
|
66
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.