Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Godwin Ansa"'
Autor:
Ezichi Mpamugo, Godwin Ansa
Publikováno v:
Journal of Information Systems and Informatics, Vol 6, Iss 3, Pp 1872-1899 (2024)
In today's dynamic networking environment, securing access to resources has become increasingly challenging due to the growth and progress of connected devices. This study explores the integration of Role-Based Access Control (RBAC) and OAuth 2.0 pro
Externí odkaz:
https://doaj.org/article/50b444e89d8745eeb9334c44c577a9ee
Publikováno v:
Wireless Personal Communications. 115:1695-1710
IEEE 802.11n standard is deployed virtually everywhere: on residences, offices, university campuses, and even market places. However, throughput obtained by end users have not measured up to the speed range of between 100 and 600 Mbps stipulated in t
Publikováno v:
Journal of Computer Sciences and Applications. 5:50-63
Denial of Service (DoS) attacks are a major network security threat which affects both wired and wireless networks. The effect of DoS attacks is even more damaging in Delay Tolerant Networks (DTNs) due to their unique features and network characteris
Publikováno v:
American Journal of Artificial Intelligence. 5:46
Spectrum Scheduling is an efficient scheme of improving spectrum utilization for faster communications, higher definition media (HDM) and data transmission. Radio spectrum is very limited in supply resulting in enormous problems related to scarcity.
Publikováno v:
Journal of Ambient Intelligence and Humanized Computing. 7:649-659
Providing Web services from the mobile cloud is a current research topic. The mobile cloud provides the computing resources and infrastructure to support the seamless provision of Web services in a lightweight manner. Security has become a major conc
The implementation of the Session Initiation Protocol (SIP)-based Voice over Internet Protocol (VoIP) and multimedia over MANET is still a challenging issue. Many routing factors affect the performance of SIP signaling and the voice Quality of Servic
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5fbfecde8a6f63ffd4573cc5a18b8c0d
https://surrey.eprints-hosting.org/813051/
https://surrey.eprints-hosting.org/813051/
Publikováno v:
IWCMC
Packet injection by an attacker can trigger flooding-based DOS attacks. This paper seeks to provide a simple and robust approach to protect the access control, data integrity and sender authentication security services in resource-constrained delay t
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783642215599
WWIC
WWIC
Delay Tolerant Network suffers from lack of resources and disconnected contact nature. In DTN, all possible methods are used to transmit data including the physical transportations means. Aircrafts in commercial routes have been proposed to carry dat
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::673426ed8d91199bd10e8755a4399047
https://doi.org/10.1007/978-3-642-21560-5_37
https://doi.org/10.1007/978-3-642-21560-5_37
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783642238246
PSATS
PSATS
Denial of Service (DOS) attacks are a major threat faced by all types of networks. The effect of DOS in a delay tolerant network (DTN) is even more aggravated due to the scarcity of resources. Perpetrators of DOS attacks in DTN-like environments look
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::66a3b9a1ea6dc850bab73a43f8b16810
https://surrey.eprints-hosting.org/764639/
https://surrey.eprints-hosting.org/764639/