To search, Click below search items.
All Published Papers Search Service
Title
A Dual Layered Encryption Algorithm for Wireless Equivalent Privacy (WEP) Algorithm
Author
Olufade, F. W. Onifade, Adenike, O. Osofisan, Chukwuzitere, U. OBODO
Vol. 8 No. 5 pp. 264-271
Keywords
IEEE 802.11, Security, Wired Equivalent Privacy, Wireless LANs (WLAN), Integrity Check Value (ICV)
Abnormality Detection by Generating Random Fields Based on Markov Random Field Theory
C. NagaRaju, L.SivaSankarReddy
Vol. 8 No. 5 pp. 260-263
Image segmentation, MRF, Probability density, misclassification, clustering
Implications of Mobile Technology Usage on Learners in a Learning Process
N. Uday Bhaskar, P. Govindarajulu
Vol. 8 No. 5 pp. 251-259
Collaboration, Context, Mobile Learning, Learning Content
A novel approach towards realizing optimum data transfer and Automatic Variable Key(AVK) in cryptography
P. Chakrabarti, B Bhuyan, A.Chowdhuri, C.T.Bhunia
Vol. 8 No. 5 pp. 241-250
optimum path selection, automatic variable key, quantum cryptography, AES, RSA, diffusion, message digest