To search, Click below search items.
All Published Papers Search Service
Title
Securing Telecommunication based on Speaker Voice as the Public Key
Author
Monther Rateb Enayah, Azman Samsudin
Vol. 7 No. 3 pp. 201-209
Keywords
Cryptography, Secure Telecommunication, Voice Recognition
Redundant Communication Avoidance for Event-Driven Wireless Sensor Network
Hung-Cuong Le, Herv? Guyennet, Noureddine Zerhouni
Vol. 7 No. 3 pp. 193-200
energy efficiency, medium access control, over-hearing, wireless sensor networks
A Formal Verification Case Study for IEEE-P.896 Bus Arbiter by using A Model Checking Tool
Katsumi Wasaki
Vol. 7 No. 3 pp. 184-192
Formal Verification, Model Checking, Temporal Logic, Bus Arbiter, Hardware Description Languages
A Framework for Predicting Security and Dependability Measures in Real-time
Karin Sallhammar, Bjarne E. Helvik, Svein J. Knapskog
Vol. 7 No. 3 pp. 169-183
Stochastic modeling, integrating security and dependability, security measures, real-time prediction, hidden Markov models