Ijcnc050208

Network Protocols & Wireless Networks en IJCNC
10 de Apr de 2013
Ijcnc050208
Ijcnc050208
Ijcnc050208
Ijcnc050208
Ijcnc050208
Ijcnc050208
Ijcnc050208
Ijcnc050208
Ijcnc050208
1 de 9

Más contenido relacionado

La actualidad más candente

82 8682 86
82 86Editor IJARCET
Ijariie1196Ijariie1196
Ijariie1196IJARIIE JOURNAL
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionEnhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionIRJET Journal
ijrrest_vol-2_issue-2_015ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015Ashish Gupta
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...IJNSA Journal
Wireless Network Security Architecture with Blowfish Encryption ModelWireless Network Security Architecture with Blowfish Encryption Model
Wireless Network Security Architecture with Blowfish Encryption ModelIOSR Journals

La actualidad más candente(20)

Destacado

Ijcnc050214Ijcnc050214
Ijcnc050214IJCNCJournal
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...IJCNCJournal
A novel scheme to improve the spectrum sensing performanceA novel scheme to improve the spectrum sensing performance
A novel scheme to improve the spectrum sensing performanceIJCNCJournal
Framework for wireless network security using quantum cryptographyFramework for wireless network security using quantum cryptography
Framework for wireless network security using quantum cryptographyIJCNCJournal
Ijcnc050211Ijcnc050211
Ijcnc050211IJCNCJournal
OPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEMEOPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEME
OPTIMIZING VOIP USING A CROSS LAYER CALL ADMISSION CONTROL SCHEMEIJCNCJournal

Similar a Ijcnc050208

Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmIJECEIAES
Advanced approach for encryption using advanced encryption standard with chao...Advanced approach for encryption using advanced encryption standard with chao...
Advanced approach for encryption using advanced encryption standard with chao...IJECEIAES
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationIJTET Journal
IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET Journal
A new hybrid text encryption approach over mobile  ad hoc network A new hybrid text encryption approach over mobile  ad hoc network
A new hybrid text encryption approach over mobile ad hoc network IJECEIAES
18. 23367.pdf18. 23367.pdf
18. 23367.pdfTELKOMNIKA JOURNAL

Similar a Ijcnc050208(20)

Más de IJCNCJournal

Ransomware Attack Detection Based on Pertinent System Calls Using Machine Lea...Ransomware Attack Detection Based on Pertinent System Calls Using Machine Lea...
Ransomware Attack Detection Based on Pertinent System Calls Using Machine Lea...IJCNCJournal
Machine Learning Based Ensemble Classifier for Android Malware DetectionMachine Learning Based Ensemble Classifier for Android Malware Detection
Machine Learning Based Ensemble Classifier for Android Malware DetectionIJCNCJournal
Intrusion Detection System (IDS) Development Using Tree-Based Machine Learnin...Intrusion Detection System (IDS) Development Using Tree-Based Machine Learnin...
Intrusion Detection System (IDS) Development Using Tree-Based Machine Learnin...IJCNCJournal
Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utili...Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utili...
Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utili...IJCNCJournal
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentEfficient ECC-Based Authentication Scheme for Fog-Based IoT Environment
Efficient ECC-Based Authentication Scheme for Fog-Based IoT EnvironmentIJCNCJournal
IoT Resource Allocation and Optimization Using Improved Reptile Search AlgorithmIoT Resource Allocation and Optimization Using Improved Reptile Search Algorithm
IoT Resource Allocation and Optimization Using Improved Reptile Search AlgorithmIJCNCJournal

Más de IJCNCJournal(20)

Último

Vani-Oct 2023 issue.pdfVani-Oct 2023 issue.pdf
Vani-Oct 2023 issue.pdfSavipriya Raghavendra
Types and Sources of impurities.pptx Pharmaceutical Inorganic chemistry UNIT-...Types and Sources of impurities.pptx Pharmaceutical Inorganic chemistry UNIT-...
Types and Sources of impurities.pptx Pharmaceutical Inorganic chemistry UNIT-...Ms. Pooja Bhandare
Food Hygiene 1 - Intro to food hygiene.pptxFood Hygiene 1 - Intro to food hygiene.pptx
Food Hygiene 1 - Intro to food hygiene.pptxCJMcErlean
Introduction of Inorganic Chemistry, History of Pharmacopoeia.pptxIntroduction of Inorganic Chemistry, History of Pharmacopoeia.pptx
Introduction of Inorganic Chemistry, History of Pharmacopoeia.pptxMs. Pooja Bhandare
Accounting with Drones - Sri Akshay - 23COMD60Accounting with Drones - Sri Akshay - 23COMD60
Accounting with Drones - Sri Akshay - 23COMD60Kumarasamy Dr.PK
Expectation from Being a Postgraduate Student and Life Strategy as A Research...Expectation from Being a Postgraduate Student and Life Strategy as A Research...
Expectation from Being a Postgraduate Student and Life Strategy as A Research...BC Chew

Último(20)

Ijcnc050208