To search, Click below search items.

 

All Published Papers Search Service

Results for ; Total 10849

Title

Enhancing Authentication Protocol from Unauthorized Access

Author

M.Muthuselvi, P.Jeevananthini, B.Vijayakumar

Citation

Vol. 15  No. 1  pp. 123-126

Keywords

Stream authentication, cryptography, content distribution network, trap door functions


Title

Fuzzy-NNARX based Tool for Monitoring and Predicting Patients Conditions using Selected Vital Signs

Author

Cecilia H. Vallejos de Schatz, Fabio K. Schneider, Paulo J. Abatti, Julio C. Nievola

Citation

Vol. 15  No. 1  pp. 113-122

Keywords

Artificial Neural Network, Fuzzy Logic, Recurrent Neural Network, Neural Network Auto-Regressive model with eXogenous inputs, NNARX, Elman


Title

Role of Threshold Cryptography in Securing MANETs

Author

Aasia Samreen, Syed Irfan Hyderv

Citation

Vol. 15  No. 1  pp. 106-112

Keywords

Threshold signature, Proxy signature, Threshold multi-signature, authentication, Threshold cryptography


Title

Secure Transmission Over Remote Group: A New Key Management Prototype

Author

K.Sudha, J.Prem ranjith, S.Ganapathy

Citation

Vol. 15  No. 1  pp. 102-105

Keywords

Access control, ad hoc networks, broadcast, cooperative computing, information security, key management


[1] ... [prev] [1711] [1712] [1713] [1714] [1715] [1716] [1717] [1718] [1719] [1720] [next] ... [2713]