A performance model of the Trusted Cloud Computing Platform VM Launch Protocol Journal title: EAI Endorsed Transactions on Cloud Systems Authors: Said Kamil, Nigel Thomas Subject(s): Computer and Information Science
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS Journal title: International Journal of Advanced Research in Engineering and Technology Authors: SYEDA GAUHAR FATIMA, SYEDA KAUSAR FATIMA and SYED MOHD ALISYEDA GAUHAR FATIMA, SYEDA KAUSAR FATIMA a... Subject(s): Engineering
The Trust-Based MAC-Layer Security Protocol for Mobile Ad hoc Networks Journal title: International Journal on Computer Science and Engineering Authors: Rajaram , Dr. S. Palaniswami Subject(s):
A COMPARATIVE STUDY OF THE SECURITY PROTOCOLS IN VANET Journal title: International Journal of Electrical, Electronics and Mechanical Fundamentals (www.ijeemf.com) Authors: Simple Nain , Sandeep Tayal Subject(s):
Detecting Malicious Node in MANET Using Trust Based Cross-Layer Security Protocol Journal title: International Journal of Computer Science and Information Technologies Authors: A.Rajaram , Dr.S.Palaniswami Subject(s):
Connecting & Addressing Security Concerns of Bluetooth Technology in Current Scenario Journal title: International journal of Emerging Trends in Science and Technology Authors: Rajnish Mehra Subject(s):
A Review of Secure Authentication based e-Payment Protocol Journal title: International Journal of Advanced Computer Science & Applications Authors: B. Ratnakanth, P. S. Avadhani Subject(s):
АТАКА С ПЕРЕУСТАНОВКОЙ КЛЮЧА (KRACK) Journal title: INTERNATIONAL ACADEMY JOURNAL "Web of Scholar" Authors: Оксана Михайловна Бакунова, Александр Михайлович Бакунов, Александр Алексеевич Котлов, Илья Олегович... Subject(s):
Hardening CISCO Devices based on Cryptography and Security Protocols - Part One: Background Theory Journal title: Annals of Emerging Technologies in Computing Authors: Faisal Waheed, Maaruf Ali Subject(s):
A Review on Wireless Sensor Network Journal title: International Journal of Trend in Scientific Research and Development Authors: Subject(s): Biological Sciences, Computer and Information Science, Engineering, Mathematics, Agricultural Engineering, Management, Engineering, Multidisciplinary
Hardening CISCO Devices based on Cryptography and Security Protocols - Part II: Implementation and Evaluation Journal title: Annals of Emerging Technologies in Computing Authors: Faisal Waheed, Maaruf Ali Subject(s):
A Review on the Verification Approaches and Tools used to Verify the Correctness of Security Algorithms and Protocols Journal title: International Journal of Advanced Computer Science & Applications Authors: Mohammed Abdulqawi Saleh Al-humaikani, AuthorsLukman Bin Ab Rahim Subject(s):
Message Sharing Database Security Protocol Designing (MSDSP) Journal title: International Journal of the Computer, the Internet and Management Authors: Somchai Prakancharoen Subject(s):
LSSCW: A Lightweight Security Scheme for Cluster based Wireless Sensor Network Journal title: International Journal of Advanced Computer Science & Applications Authors: Ganesh R. Pathak, M.S.Godwin Premi, Suhas H. Patil Subject(s):
ANALYSIS OF ISSUES RELATED TO BIOMETRIC AUTHENTICATION IN PAYMENT Journal title: International scientific journal Science and Innovation Authors: Agzamova M. Subject(s): Archaeology, Arts and Literature, Biological Sciences, Chemistry, Computer and Information Science, Economics, Education, Humanities, Law, Linguistics, Mathematics, Medicine, Philosophy, Physics, Psychology, Social Sciences, Architecture, Agricultural Science