Funding Data Link References Status API Help
type
year
publication
category
publisher
funder name
source
Page 10 of 13839594 results
Sort by: relevance publication year

Neural network based decryption for random encryption algorithms

Conference Paper published Aug 2009 in 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication

Authors: Rathi Kannan Munukur, Vignesh Gnanam

Wavelet-based analysis of network security databases

Conference Paper published in International Conference on Communication Technology Proceedings, 2003. ICCT 2003.

Authors: Wu Liu, Haixin Duan, Peng Wang, Jianping Wu, Lu Yang

Network security policy for large-scale VPN

Conference Paper published in International Conference on Communication Technology Proceedings, 2003. ICCT 2003.

Authors: Rongsheng Shan, Shenghong Li, Mingzheng Wang, Jianhua Li

Security and AAA Architecture for WiFi-WiMAX Mesh Network

Conference Paper published Oct 2007 in 2007 4th International Symposium on Wireless Communication Systems

Authors: Abed Ellatif Samhat, Miloud Abdi

Wireless body area network security issues — Survey

Conference Paper published Dec 2016 in 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)

Authors: M Raj Kumar Naik, P. Samundiswary

Network security situation prediction method based on MEA-BP

Conference Paper published Feb 2017 in 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)

Authors: Pu Xiao, Ming Xian, Huimei Wang

Improvisation of Security Aspect in Steganography Applying DES

Conference Paper published Apr 2013 in 2013 International Conference on Communication Systems and Network Technologies

Authors: M. K. Ramaiya, N. Hemrajani, A. K. Saxena

Design of Security Neighbor Discovery Protocol

Conference Paper published Apr 2013 in 2013 International Conference on Communication Systems and Network Technologies

Authors: Hua Chun Liu, Qing Guang Dai

Management System Discussion of Electronic Commerce Security

Conference Paper published Apr 2013 in 2013 International Conference on Communication Systems and Network Technologies

Authors: Yaojun Yan, Shuning Li

Enhancing Security by Averaging Multiple Fingerprint Images

Conference Paper published Apr 2013 in 2013 International Conference on Communication Systems and Network Technologies

Authors: M. Singh, S. Ayub, R. Verma

Security Architecture for MANET and Its Application in M-Governance

Conference Paper published Apr 2013 in 2013 International Conference on Communication Systems and Network Technologies

Authors: B. Kaur

Embedded Systems -- A Security Paradigm for Pervasive Computing

Conference Paper published Apr 2013 in 2013 International Conference on Communication Systems and Network Technologies

Authors: S. Sharma

Advanced Security Algorithm for Power Grid

Conference Paper published Apr 2013 in 2013 International Conference on Communication Systems and Network Technologies

Authors: G. Gangil, R. Narvey

User Security in e-Learning System

Conference Paper published Apr 2015 in 2015 Fifth International Conference on Communication Systems and Network Technologies

Authors: Hassan Faisal Aldheleai, Mohammad Ubaidullah Bokhari, Hatem S.A. Hamatta

A Critical Analysis of Privacy and Security on Social Media

Conference Paper published Apr 2015 in 2015 Fifth International Conference on Communication Systems and Network Technologies

Authors: Sangeeta Kumari, Shailendra Singh

A Framework for Security-Aware Virtual Network Embedding

Conference Paper published Aug 2015 in 2015 24th International Conference on Computer Communication and Networks (ICCCN)

Authors: Yang Wang, Phanvu Chau, Fuyu Chen

Multigroup Communication

Chapter published in IFIP International Federation for Information Processing on pages 315 to 326

Authors: Agnieszka Chodorek, Robert R. Chodorek

Establishing the security foundations for network protocol design

Conference Paper published Nov 2012 in 2012 IEEE 14th International Conference on Communication Technology

Authors: Zebo Feng, Xiaoping Wu, Liangli Ma, Wei Ren

A proposed architecture for SCADA network security

Conference Paper published Mar 2011 in 2011 International Conference on Computer, Communication and Electrical Technology (ICCCET)

Authors: V. Lakshmi priya, C. Bala Subramanian

The Communication Protocol for Wireless Sensor Network about LEACH

Conference Paper published Dec 2007 in 2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)

Authors: Yiming Fan, Jianjun Yu