To search, Click below search items.
All Published Papers Search Service
Title
Analysis of IP Prefix Hijacking and Traffic Interception
Author
Khin Thida Latt, Yasuhiro Ohara, Satoshi Uda, Yoichi Shinoda
Vol. 10 No. 7 pp. 22-31
Keywords
Hijacking, Interception, BGP, Routing
Channel Adaptive MAC Protocol with Traffic-Aware Distributed Power Management in Wireless Sensor Networks-Some Performance Issues
Binu G S, K Poulose Jacob
Vol. 10 No. 7 pp. 14-21
Wireless sensor network, MAC, Fairness, error rate, energy consumption, throughput
An ID-Based Public key Cryptosystem based on the Double Discrete Logarithm Problem
Chandrashekhar Meshram, Shyam Sundar Agrawal
Vol. 10 No. 7 pp. 8-13
Public key Cryptosystem, Identity based Cryptosystem, Discrete Logarithm Problem, Double Discrete Logarithm Problem and Hash function
A Linux Implementation of Windows ACLs
William Mahoney, James Harr
Vol. 10 No. 7 pp. 1-7
Linux, Access Control Lists, File Security