• Nenhum resultado encontrado

[PDF] Top 20 Secure Mobile Agent based Information Gathering in Wireless Network

Has 10000 "Secure Mobile Agent based Information Gathering in Wireless Network" found on our website. Below are the top 20 most common "Secure Mobile Agent based Information Gathering in Wireless Network".

Secure Mobile Agent based Information Gathering in Wireless Network

Secure Mobile Agent based Information Gathering in Wireless Network

... the wireless environment to bring the smartness to the society. In this situation, it is necessary to bring the smart technologies in the wireless ...this in mind, we concentrated to ... See full document

5

Real-time FPGA-based Non-Cryptography System for Wireless Network

Real-time FPGA-based Non-Cryptography System for Wireless Network

... transmitted information. The broadcast nature of the wireless channel exposes the transmission to ...the wireless channel is commonly done by implementing enciphering and deciphering algorithms ... See full document

6

Handoff Based Secure Checkpointing and Log Based Rollback Recovery for Mobile Hosts

Handoff Based Secure Checkpointing and Log Based Rollback Recovery for Mobile Hosts

... checkpoint in wireless channel: Mobile computing system is used in various financial transactions where fault tolerance is ...tolerance secure check pointing is an important ...insecure ... See full document

17

Modelling Efficient Process Oriented Architecture for Secure Mobile Commerce Using Hybrid Routing Protocol in Mobile Adhoc Network

Modelling Efficient Process Oriented Architecture for Secure Mobile Commerce Using Hybrid Routing Protocol in Mobile Adhoc Network

... for secure mobile commerce framework using uniquely designed hybrid mobile adhoc routing protocols using reactive and proactive type in real time ...of mobile commerce which is one of ... See full document

11

AT2A: Defending Unauthenticated Broadcast Attacks in Mobile Wireless Sensor Networks

AT2A: Defending Unauthenticated Broadcast Attacks in Mobile Wireless Sensor Networks

... EEMDTS based on multipath data transferring scheme to unauthenticated packets detection and filtering has been ...redundancy in routing algorithms as multipath routing to prevent access of event ... See full document

6

Authentication of Secure Data Transmission In Wireless Routing

Authentication of Secure Data Transmission In Wireless Routing

... requirements. Based on the available path bandwidth information, a source can immediately determine some infeasible connection requests with the high bandwidth ...scenarios. Network links and paths ... See full document

4

Proactive network management based mobile agent and fuzzy logic

Proactive network management based mobile agent and fuzzy logic

... each network element to be managed should be configured to execute codes written in Java ...executing, in this case supported by Voyager, to support the reception of mobile ...(Simple ... See full document

5

Fidelity Based On Demand Secure(FBOD) Routing in Mobile Adhoc Network

Fidelity Based On Demand Secure(FBOD) Routing in Mobile Adhoc Network

... Ad-hoc Network (MANET) is a collection of wireless mobile hosts without fixed network [20] infrastructure and centralized administration ...Communication in MANET [8] is done via ... See full document

9

Secure and Efficient Vertical Handover in Heterogeneous Wireless Networks

Secure and Efficient Vertical Handover in Heterogeneous Wireless Networks

... from network provider[6]. In this condition, it is mandatory for wireless user to get authenticated both from network provider as well as service ...provider. In such scenario, AAA ... See full document

5

A Multi-Agent Based Data Replication Mechanism for Mobile Grid

A Multi-Agent Based Data Replication Mechanism for Mobile Grid

... nodes in the given network, ...considered in the network, which is to be replicated at selected grid ...problem in the above modeled grid environment can be defined as ...be in ... See full document

11

An Advancement To The Security Level Through Galois Field In The Existing Password Based Technique Of Hiding Classified Information In Images

An Advancement To The Security Level Through Galois Field In The Existing Password Based Technique Of Hiding Classified Information In Images

... field in which there exists finitely many ...useful in translating computer data as they are represented in binary ...results in the 8 bit of the result but the Galois technique multiplication ... See full document

6

Mobile platform-independent solutions for body sensor network interface

Mobile platform-independent solutions for body sensor network interface

... view information (limited to screen resolution) through a graphical view and some added functionalities like a ...sensing in order to sense specific patient ...a mobile device or a PC located at the ... See full document

120

Throughput Improvement In Wireless Mesh Networks By Integrating With Optical Network

Throughput Improvement In Wireless Mesh Networks By Integrating With Optical Network

... overall network throughput subject to the fairness constraint. In general, most work on both Optical-wireless networks and WMNs focus on the traffic destined to gateways for the Internet ... See full document

7

Zone Based Routing Protocol for Homogeneous Wireless Sensor Network

Zone Based Routing Protocol for Homogeneous Wireless Sensor Network

... constraint in designing a routing protocol in WSNs is limited power of sensor nodes that mandates the design of energy-efficient communication ...other wireless networks like mobile or ... See full document

13

Data Stream Based Algorithms For Wireless Sensor Network Applications

Data Stream Based Algorithms For Wireless Sensor Network Applications

... A wireless sensor network (WSN) is energy con- strained, and the extension of its lifetime is one of the most important issues in its ...environment. In contrast to the conventional remote ... See full document

8

Route planning in wireless sensor networks for data gathering purposes

Route planning in wireless sensor networks for data gathering purposes

... limited in processing capabilities, local data analysis may not be a viable option and, therefore, it becomes crucial to forward the data to a device with higher capabilities for further ...the network ... See full document

78

DATA GATHERING IN WIRELESS SENSOR NETWORKS USING INTERMEDIATE NODES

DATA GATHERING IN WIRELESS SENSOR NETWORKS USING INTERMEDIATE NODES

... considered in this paper is to gather data generated from sensor nodes every ...The network is assumed to be homogenous in that sensor nodes are required to sense identical type of ...consumed ... See full document

12

Secure Information Sharing in Mixed-Criticality Systems

Secure Information Sharing in Mixed-Criticality Systems

... Looking at the exemplary automotive application with the five speed sensors, two faulty sensors can be detected. The main problem in this application is the breaking scenario, where a huge deviation between the ... See full document

7

Building consumer-brand relationship through mobile marketing

Building consumer-brand relationship through mobile marketing

... important. In an attention economy, Kapferer (2008) states in his book that there is so much choice and opacity and consumers cannot spend their time comparing before making a ...employed in the ... See full document

121

Respect for privacy begins when gathering information

Respect for privacy begins when gathering information

... produced in 2001 regarding this, by the ex- tinct High Authority for the Mass ...Media. In a directive about authorization for the use of images in television, of people in situations of ... See full document

16

Show all 10000 documents...