Zobrazeno 1 - 10
of 29
pro vyhledávání: '"Fahad Bin Muhaya"'
Autor:
Abdur Rashid Sangi, Chang Liu, Mohammed Saeed Alkatheiri, Fahad Bin Muhaya, Satish Anamalamudi
Publikováno v:
A Comprehensive Guide to 5G Security
This chapter briefly describes the security considerations of WiFi and LiFi network interconnections with 5G Networks. When designing 5G networks with short range WiFi and LiFi connectivity, architectural considerations must be accompanied with respe
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5a486a10a3f01280f8230f310ebcb1a6
https://doi.org/10.1002/9781119293071.ch7
https://doi.org/10.1002/9781119293071.ch7
Publikováno v:
Applied Mathematics & Information Sciences. 8:27-33
With the rapid and progressive development of medical images and data exchange in digital formats, information security and image encryption are becoming more important in data storage and transmission. Because of the widespread use of medical images
Publikováno v:
Multimedia Tools and Applications. 66:161-164
Publikováno v:
Journal of Socialomics.
Assessing the benefits of e-government is an essential issue for understanding its efficiency and justifying its future continuous development . This paper is concerned with introducing an approach for this assessment involving basic principles, and
Publikováno v:
International Journal of Multimedia and Image Processing. 1:35-39
Wireless mesh networks (WMNs) are new type of networks in which every node can communicates to all neighboring nodes to enhance network reliability and performance. Network traffic cost optimization and its security in wireless mesh network is a chal
Publikováno v:
Computers & Mathematics with Applications. 60:198-208
In order to provide essential data services, the cellular networks have opened interface with Internet enabling communication with the users beyond the coverage of their wireless signals across the globe. Besides economical expansion of the global sy
Publikováno v:
ICT
In this paper, we inspire from two analogies: the warfare kill zone and the airport check-in system, to tackle the issue of spam botnet detection. We add a new line of defense to the defense-in-depth model called the third line. This line is represen
Publikováno v:
ISBAST
Smart card is a widely accepted user authentication tool to ensure only authorized access to resources available via open networks. In 2010, Sood et al. and Song independently examined a smart card based authentication scheme proposed by Xu et al. Th
Publikováno v:
EAIS
In order to extract knowledge from the growing information available over the Internet, it is imperative that we classify the information first. Classification is a vastly researched topic in the field of data mining and text data, representing a sig
Publikováno v:
Advances in Brain Inspired Cognitive Systems ISBN: 9783642387852
BICS
BICS
In 2010, Chen et al. focused at the vulnerability of smart card based authentication systems owing to leakage of secret information from smart card. They proposed a scheme with a view to boost the security of such authentication systems. However, in
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b7631700435646ff55869bd3d721c8b6
https://doi.org/10.1007/978-3-642-38786-9_31
https://doi.org/10.1007/978-3-642-38786-9_31