Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Junaid, Israr"'
Publikováno v:
Pakistan Journal of Medical and Health Sciences. 16:724-727
Objectives: To determine the effect COVID-19 pandemic had on orthodontic patients during the lockdown phase as well as to determine the knowledge of patients regarding the COID-19 disease, its spread, its symptoms, and its prevention. Methodology: Th
Autor:
Usman, Zaheer, Maliha, Shahbaz, Naauman, Zaheer, Junaid, Israr, Asim, Riaz, Aneeqa, Yaqub, Mohammad Khursheed, Alam
Publikováno v:
Work. 72:1153-1161
BACKGROUND: The coronavirus disease 2019 (COVID-19) has immensely affected the world’s population at physical and psychosocial levels. Dentists are no different from other healthcare providers, as they are equally if not more exposed to the threat
Autor:
Mounib Khanafer, Hamid Hajaje, Junaid Israr, Mouhcine Guennoun, Zine El Abidine Guennoun, Youssef Gahi
Publikováno v:
CCECE
ElGamal system was introduced by Taher ElGamal in his landmark paper in 1985 [1]. ElGamal is an important asymmetric cryptosystem that is based on the discrete logarithm problem. In brief, this cryptosystem relies on the difficulty of computing discr
Publikováno v:
International Journal of Advanced Computer Science and Applications. 12
Both IEEE 802.11 and IEEE 802.15.4 standards adopt the CSMA-CA algorithm to manage contending nodes’ access to the wireless medium. CSMA-CA utilizes the Binary Exponential Backoff (BEB) scheme to reduce the probability of packet collisions over the
Publikováno v:
CCECE
Current Path Computation Elements (PCE) are limited to scaling only hundreds to a few thousand nodes, depending on the underlying path computation algorithm. This is because the entire network is considered one domain when applying the path computati
Publikováno v:
CSCloud
A wormhole attack is a specific mechanism where two or more Autonomous Systems (ASes) coordinate to perform a black hole attack by exchanging secure BGP updates over a tunnel, signing route attestations for each other. Routing protocols generally cho
Publikováno v:
CCECE
Web of Science
Web of Science
Credible BGP (C-BGP) is a lightweight alternative to secure BGP. Its main design objective is to address signature verification costs and deployment challenges associated with S-BGP. To this end, C-BGP defines a control layer of trusted ASes that is
Publikováno v:
ISCC
Secure Border Gateway Protocol (S-BGP) mandates that upon reception of a BGP UPDATE message, an S-BGP speaker must verify nested signatures of all nodes in the traversed path; and the router should verify the Address Attestation to check if the sourc
Publikováno v:
GLOBECOM
BGP is built under the assumption that Autonomous Systems (ASes) are trusted and operate according to the standard. This was quickly revealed to be untrue in the current model of the Internet. Many subsequent protocols were proposed to address the se