-
1by Gudapati, Supriya“... especially for MANETs. To ensure higher security and reduce the network overhead and delay, we use a...”
Published 2015
Get full text
-
2by Wood, Christopher A.“...-to-end encryption. This reduces security to data transport instead of data itself. Content-Centric...”
Published 2018
Get full text
-
3by Neise, Patrick“...<p> Organizations of all types and their computer networks are constantly under threat of attack...”
Published 2018
Get full text
-
4by Johnston, Reece G.“...<p> In this paper, we describe a secure distributed storage model to be used especially...”
Published 2016
Get full text
-
5by Freet, David Nathan“... and logged network data within the domains of network security, network and cloud forensics, attack...”
Published 2017
Get full text
-
6by Matta Veera Venkata, Sudheer“... network, data confidentiality, efficiency and data security are the basic requirements. A protocol, which...”
Published 2015
Get full text
-
7by Padilla-Franco, Javitt Higmar Nahitt“.... The ability to connect multiple disparate processors, is possible due to the use of a secure minimalistic...”
Published 2018
Get full text
-
8by Rao, Ashish Rao Janardhan“... Switching (MPLS) backbone cloud between two locations and to implement network security by applying enable...”
Published 2015
Get full text
-
9
-
10by Talhi, Chamseddine“... to its security, portability, mobility and network support features. The platform of choice...”
Published 2007
Get full text
Others -
11by Li, Lifeng“... backsides. This thesis proposes three new solutions to address security, computation and data issues...”
Published 2017
Get full text
-
12by Verma, Yukti“... including sensors, edge routers, web interfaces, endpoints to the IoT network and access control. Several...”
Published 2016
Get full text
-
13by Ellithorpe, James O.“...<p> Business organizations are faced with an enormous challenge to improve cyber security...”
Published 2016
Get full text
-
14by Corser, George P.“... in vehicular network privacy has not thoroughly considered vehicular mobility patterns. Previous work...”
Published 2016
Get full text
-
15by Saed, Mustafa“... grid networks will be performed. Finally, a technique for verifying the security of the three developed...”
Published 2019
Get full text
-
16by Wadhwa, Preeti H.“... of various security attacks on the network. Broadcast communication has well known advantages in large scale...”
Published 2015
Get full text
-
17by Nur, Abdullah Yasin“... operators to enhance the reliability and security of their networks; allows network engineers to improve...”
Published 2019
Get full text
-
18by Okoye, Stella Ifeyinwa“... the effects of information security threats: network security, physical security, strong password policy...”
Published 2017
Get full text
-
19by Schmalen, Daniel“... connection to a third-party company, to avoid security leaks in the owner’s network. Furthermore...”
Published 2018
Get full text
-
20by Zonenberg, Andrew D.“...<p> Security of monolithic kernels, and even microkernels, relies on a large and complex body...”
Published 2015
Get full text