To search, Click below search items.
All Published Papers Search Service
Title
A Network Authentication Protocol Based on Kerberos
Author
Eman El-Emam, Magdy Koutb, Hamdy Kelash, Osama Farag Allah
Vol. 9 No. 8 pp. 17-26
Keywords
Access control, authentication, authorization, computer network security, Kerberos, protocols
A scalable distributed IDS Architecture for High speed Networks
Hassen Sallay, Khalid A. AlShalfan, Ouissem Ben Fred j
Vol. 9 No. 8 pp. 9-16
Intrusion Detection, High Speed Networks, Distributed Architecture, Scalability
Formal Verification of Ring-based Leader Election Protocol using Predicate Diagrams
Cecilia E. Nugraheni
Vol. 9 No. 8 pp. 1-8
Leader election protocol, distributed systems, verification, TLA* TLA+, predicate diagrams*
Parallel Algorithm for Solving Large System of Simultaneous Linear Equations
K. Rajalakshmi
Vol. 9 No. 7 pp. 276-279
Parallel, Solving, Simulaneous