To search, Click below search items.
All Published Papers Search Service
Title
CAuth ? Protecting DNS application from spoofing attacks
Author
NM SAHRI, Koji OKAMURA
Vol. 16 No. 6 pp. 125-134
Keywords
DNS flooding attack, spoofing detection, authentication, network security, Openflow, SDN
Secure Personal Pervasive Active Space
Jalal al-Muhtadi, Khaloud Zainalabdeen
Vol. 16 No. 6 pp. 135-139
Pervasive and ubiquitous computing. Security. Mutual authentication. Cryptography.
Allocation Algorithm based on CAC Scheme for LTE Network
Radhia Khdhir, Kais Mnif, Khitem Ben Ali, Lotfi Kammoun
Vol. 16 No. 6 pp. 140-150
Call admission control, QoS, Scheduling, LTE, Uplink, Throughput.
Location-Based Routing Protocols GAF and its enhanced versions in Wireless Sensor Network a Survey
Hanane AZNAOUI, Said RAGHAY, Layla AZIZ
Vol. 16 No. 6 pp. 151-156
WSN, routing protocols, location-based, GAF.