Now showing items 1-6 of 6
Electromagnetic interactions analysis between tow 3-D scatteres using the e-pilemethod combined with the po approximation
In this paper, the electromagnetic scattering from two scatterers is analyzed from a rigorous integral formulation solved by the method of moments (MoM). G. Kubick¶e has recently developed the E- PILE (Extended ...
Discovery and Group Communication for Constrained Internet of Things Devices using the Constrained Application Protocol
(Ghent University, 2015)
The ubiquitous Internet is rapidly spreading to new domains. This expansion of the Internet is comparable in scale to the spread of the Internet in the ’90s. The resulting Internet is now commonly referred to as the ...
Data Integrity Mechanism Using Hashing Verification
In this paper, we propose a new One-Way Hash Algorithm, which is also obtains better efficiency and security, compared with a particular conventional hash algorithm, Hash algorithm can be used to determine if two values ...
SWMPT: Securing Wireless Mesh Networks Protocol Based on Ticket Authentication
Wireless mesh network (WMN) consists of two parts: mesh access points which are relatively static and energy-rich devices, and mesh clients which are relatively dynamic and power constrained. In this paper, we present a ...
Securing End-to-End Wireless Mesh Networks Ticket-Based Authentication
Hybrid wireless mesh network (WMN) consists of two types of nodes: Mesh Routers which are relatively static and energy-rich devices, and Mesh Clients which are relatively dynamic and power constrained devices. In this ...
Dynamic User-Oriented Role Based Access Control Model (DUO-RBAC)
Most researchers use role mining to generate role-based access con- trol model from the existing user-permission assignments. User-oriented role- based access control model is a type of role-based access control model, ...