الآن تُعرض المواد 1 -- 10 من 12
المجموعات أو الوحدات المطابقة لاستعلامك
Computer Networks and Their Applications 
Computer Networks and Their Applications
Data Mining Research 
Data Mining Research
Learning Technologies and Data Analytics 
Learning Technologies and Data Analytics
Mobile Networks and Information security 
Mobile Networks and Information security
المواد المطابقة لاستعلامك
Electromagnetic interactions analysis between tow 3-D scatteres using the e-pilemethod combined with the po approximation
In this paper, the electromagnetic scattering from two scatterers is analyzed from a rigorous integral formulation solved by the method of moments (MoM). G. Kubick¶e has recently developed the E- PILE (Extended ...
Data Integrity Mechanism Using Hashing Verification
In this paper, we propose a new One-Way Hash Algorithm, which is also obtains better efficiency and security, compared with a particular conventional hash algorithm, Hash algorithm can be used to determine if two values ...
SWMPT: Securing Wireless Mesh Networks Protocol Based on Ticket Authentication
Wireless mesh network (WMN) consists of two parts: mesh access points which are relatively static and energy-rich devices, and mesh clients which are relatively dynamic and power constrained. In this paper, we present a ...
Securing End-to-End Wireless Mesh Networks Ticket-Based Authentication
Hybrid wireless mesh network (WMN) consists of two types of nodes: Mesh Routers which are relatively static and energy-rich devices, and Mesh Clients which are relatively dynamic and power constrained devices. In this ...
Discovery and Group Communication for Constrained Internet of Things Devices using the Constrained Application Protocol
(Ghent University, 2015)
The ubiquitous Internet is rapidly spreading to new domains. This expansion of the Internet is comparable in scale to the spread of the Internet in the ’90s. The resulting Internet is now commonly referred to as the ...
Dynamic User-Oriented Role Based Access Control Model (DUO-RBAC)
Most researchers use role mining to generate role-based access con- trol model from the existing user-permission assignments. User-oriented role- based access control model is a type of role-based access control model, ...