Связь компьютеров. Сети ЭВМ. Вычислительные сети - 004.7

Научные статьи

В разделе "Связь компьютеров. Сети ЭВМ. Вычислительные сети"
Exploiting SIMD Instructions in Modern Microprocessors to Optimize the Performance of Stream Ciphers
P. Mabin Joseph, J. Rajan, K.K. Kuriakose, S.A.V. Satya Murty
Wi-Fi Networks Security and Accessing Control
Tarek S. Sobh
A Survey of Adaptive Gateway Discovery Mechanisms in Heterogeneous Networks
Rafi U Zaman, Khaleel ur Rahman Khan, A.Venugopal Reddy
Analysis of the SYN Flood DoS Attack
Mitko Bogdanoski, Tomislav Shuminoski, Aleksandar Risteski
A Novel Solution for Discriminating Wormhole Attacks in MANETs from Congested Traffic using RTT and Transitory Buffer
Maria Sebastian, Arun Raj Kumar P.
Study and Analysis of Text Steganography Tools
Indradip Banerjee, Souvik Bhattacharyya, Gautam Sanyal
Performance Evaluation and Comparison of Network Firewalls under DDoS Attack
Chirag Sheth, Rajesh Thakker
Textual Manipulation for SQL Injection Attacks
Hussein AlNabulsi, Izzat Alsmadi, Mohammad Al-Jarrah
Scheduling in Grid Systems using Ant Colony Algorithm
Saeed Molaiy, Mehdi Effatparvar
Minimization of Power Consumption in Mobile Adhoc Networks
B.Ruxanayasmin, B.Ananda Krishna, T.Subhashini
Audio Codecs in VoIPv6: A Performance Analysis
Monjur Ahmed, Mohammad Sarwar Hossain Mollah
ECCO Mnemonic Authentication—Two-Factor Authentication Method with Ease-of-Use
Saman Gerami Moghaddam, Amin Nasiri, Mohsen Sharifi
Mobility Based Cluster Head Selection Algorithm for Mobile Ad-Hoc Network
Soumyabrata Talapatra, Alak Roy
A Generic Middleware Model for Smart Home
Madhusudanan J., Hariharan S., Manian A. Selvan, V. Prasanna Venkatesan
Security, Privacy and Trust Challenges in Cloud Computing and Solutions
Seyyed Yasser hashemi, Parisa Sheykhi Hesarlo
Analysis of Host-Based and Network-Based Intrusion Detection System
Amrit Pal Singh, Manik Deep Singh
A New Classification Scheme for Intrusion Detection Systems
Bilal Maqbool Beigh
C2DF: High Rate DDOS filtering method in Cloud Computing
Pourya Shamsolmoali, M.Afshar Alam, Ranjit Biswas
SM-SIP: Seamless Mobility Management for Heterogeneous Wireless Networks
Khaled Zeraoulia, Nadjib Badache
Trust Metric based Soft Security in Mobile Pervasive Environment
Madhu Sharma Gaur, Bhaskar Pant
VoIP Performance Analysis over IPv4 and IPv6
Monjur Ahmed, Alan T Litchfield, Shakil Ahmed, Adnan Mahmood, Md. Emran Hossain Meazi
OpenFlow Technology: A Journey of Simulation Tools
Rakesh k. Jha, Pooja Kharga, Idris Z. Bholebawa, Sangeet Satyarthi, Anuradha, Shashi Kumari
A Comprehensive Analysis of Android Security and Proposed Solutions
Asim S. Yuksel, Abdul H. Zaim, Muhammed A. Aydin
Controlling Information Flows in Net Services with Low Runtime Overhead
Shih-Chien Chou
Linear Crossed Cube (LCQ): A New Interconnection Network Topology for Massively Parallel System
Zaki A. Khan, Jamshed Siddiqui, Abdus Samad
Secure Usable Authentication Using Strong Pass text Passwords
C. Shoba Bindu
Server-Side Encrypting and Digital Signature Platform with Biometric Authorization
Leszek Siwik, Lukasz Mozgowoj
DNS Pharming through PHP Injection: Attack Scenario and Investigation
Divya Rishi Sahu, Deepak Singh Tomar
Embedded Real-Time HTTP Server
Radosław Czarnecki, Stanislaw Deniziak
Single Sign-On in Cloud Federation using CloudSim
Manoj V. Thomas, Anand Dhole, K. Chandrasekaran
Information Hiding Using Least Significant Bit Steganography and Cryptography
Shailender Gupta, Ankur Goyal, Bharat Bhushan
Graph Structured Data Security using Trusted Third Party Query Process in Cloud Computing
Prakash G L, Manish Prateek, Inder Singh
Addressing the Bandwidth issue in End-to-End Header Compression over IPv6 Tunneling Mechanism
Dipti Chauhan, Sanjay Sharma
A Cluster based Key Management Scheme for Underwater Wireless Sensor Networks
Seema Verma, Prachi
Secure Allocation of Resources in Cloud Using Trust
Usha Divakarla, K. Chandrasekaran
Design of a Robust, Computation-Efficient and Secure 3P-EKE Protocol using Analogous Message Transmission
Archana Raghuvamshi, Premchand Parvataneni
A Note on Group Authentication Schemes
Mohsen Pourpouneh, Rasoul Ramezanian, Afshin Zarei
Analyzing Multiple Routing Configuration
Meenakshi Moza, Suresh Kumar
Primary-Backup Access Control Scheme for Securing P2P File-Sharing Systems
Jianfeng Lu, Ruixuan Li, Zhengding Lu, Xiaopu Ma
Application of Combinatory Mechanism on RTOS UFS ACM for Risk Optimization
Padma Lochan Pradhan