• Nenhum resultado encontrado

[PDF] Top 20 Validation of authentication protocols for mobile satellite systems

Has 10000 "Validation of authentication protocols for mobile satellite systems" found on our website. Below are the top 20 most common "Validation of authentication protocols for mobile satellite systems".

Validation of authentication protocols for mobile satellite systems

Validation of authentication protocols for mobile satellite systems

... variety of protocols have been proposed so as to provide security for mobile satellite communication ...These protocols should be tested to check their functional correctness before ... See full document

5

One Time Secret Key Mechanism for Mobile Communication

One Time Secret Key Mechanism for Mobile Communication

... method of user password authentication, is secure even if an intruder can read the system's data, and can tamper with or eavesdrop on the communication between the user and the ...description of ... See full document

9

Identification of Closest and Phantom Nodes in Mobile Ad Hoc  Networks

Identification of Closest and Phantom Nodes in Mobile Ad Hoc Networks

... multitude of ad hoc security protocols addressing a number of problems related to NPV, there are no lightweight, robust solutions to NPV that can operate autonomously in an open, ephemeral ... See full document

10

Authentication protocols for D2D communications

Authentication protocols for D2D communications

... one of the most promising technologies of new mobile communication networks (5G), and essential for the Communicating Things Networks (CTNs) ...billions of devices are expected to be ... See full document

155

 Glimpses for Effective implementation of  Virtual Trainer

Glimpses for Effective implementation of Virtual Trainer

... All learners require a flexible approach to the course. In addition, communication between the learners and lectures was limited to face-to-face meetings during specified periods. In virtual classroom, content was used ... See full document

9

Investigating The Use Of Mobile Computing In Zimbabwe Polytechnics Case Of A Polytechnic In Zimbabwe

Investigating The Use Of Mobile Computing In Zimbabwe Polytechnics Case Of A Polytechnic In Zimbabwe

... mix of Information Communication Technologies (ICTs), varying from one institution to the ...laboratories of clone desktops, some did not have even a single ...for mobile computing in ... See full document

5

BitTorrent-Like Protocols for Interactive Access to VoD Systems

BitTorrent-Like Protocols for Interactive Access to VoD Systems

... studies of neighbor selection policies so far presented in the literature, we may notice that the original choke algorithms of the BitTorrent protocol are still the most competitive alternatives [2, 22, ... See full document

20

Adaptive Antenna Array for Satellite Communication Systems

Adaptive Antenna Array for Satellite Communication Systems

... arrangement of many individual antennas which are placed in space and phase such that the contribution of individual antennas add in one desired direction and cancel in other ... See full document

4

Fault Tolerant Distributed and Fixed Hierarchical Mobile IP

Fault Tolerant Distributed and Fixed Hierarchical Mobile IP

... the mobile hosts registered at a healthy GFA have not moved beyond its layer 2 when a failure has occurred at ...the mobile hosts residing with healthy FAs will request for micro-registrations with their ... See full document

19

Rev. Col. Bras. Cir.  vol.41 número3

Rev. Col. Bras. Cir. vol.41 número3

... repair of bilateral cleft lip and palate has achieved unsatisfactory results, leaving stigmas that require multiple revisions throughout ...alignment of the jaw have facilitated the correction by decreasing ... See full document

7

COMPARATIVE REVIEW FOR ROUTING PROTOCOLS IN MOBILE AD-HOC NETWORKS

COMPARATIVE REVIEW FOR ROUTING PROTOCOLS IN MOBILE AD-HOC NETWORKS

... value of this protocol is the ability to divide all networks members into a set of groups called ...basis of proactive routing ...member of their local zone or ...overhead of flooding ... See full document

19

METHODS FOR QUALITY ENHANCEMENT OF USER VOICE SIGNAL IN VOICE AUTHENTICATION SYSTEMS

METHODS FOR QUALITY ENHANCEMENT OF USER VOICE SIGNAL IN VOICE AUTHENTICATION SYSTEMS

... usage of computer systems user voice in the authentication process is ...ratio of the user voice signal in the authentication system is ...object of study is the process ... See full document

6

On Some Security Issues in Pervasive Computing - Light Weight Cryptography

On Some Security Issues in Pervasive Computing - Light Weight Cryptography

... are of great use in environments where the level of security is medium and span of the security provision is less for example for a single ...is of great help in such resource constrained ... See full document

7

Fault Tolerance Mobile Agent System Using Witness Agent in 2-Dimensional Mesh Network

Fault Tolerance Mobile Agent System Using Witness Agent in 2-Dimensional Mesh Network

... behalf of a user or its owner and travel through a network of heterogeneous ...methods of fault tolerance in mobile agents are described which they are considered in linear network ...types ... See full document

6

A REMOTE SENSING DERIVED UPPER OCEAN HEAT CONTENT DATASET FOR THE EQUATORIAL ATLANTIC: COMPARISON WITH PIRATA PROJECT DATA

A REMOTE SENSING DERIVED UPPER OCEAN HEAT CONTENT DATASET FOR THE EQUATORIAL ATLANTIC: COMPARISON WITH PIRATA PROJECT DATA

... the heat content could be related to changes in sea level by a li- near relationship based on the assumption that the upper layer expansion/contraction was mainly due to temperature variations. Since changes in salinity ... See full document

14

MESSAGE AUTHENTICATION CODE BASED SECURE GROUP KEY MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS

MESSAGE AUTHENTICATION CODE BASED SECURE GROUP KEY MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS

... In mobile ad hoc network, the communication would not be possible without the proper coverage among the ...the mobile nodes are changing their location very frequently, the communication would not be ... See full document

9

Rev. Bras. Geof.  vol.29 número1

Rev. Bras. Geof. vol.29 número1

... Archiving Validation and Interpretation of Satellite Data in Oceanography (AVISO), dados de temperatura da superf´ıcie do mar provenientes do sensor TRMM Microwave Imager , assim como dados ... See full document

14

Development of a new system to control and monitor ground vehicles using heterogeneous mobile networks

Development of a new system to control and monitor ground vehicles using heterogeneous mobile networks

... The MAVLink is an application level protocol. Thus, there is need to implement a transport protocol. The most used is Transmission Control Protocol (TCP), which is connection-oriented protocol that implements message ... See full document

94

Model Based System Engineering Approach of a Lightweight Embedded TCP/IP

Model Based System Engineering Approach of a Lightweight Embedded TCP/IP

... The hardware layer includes the basic hardware components. The internal block diagram is shown in Figure 4. The used approach presents a simple I/O mapping using a simple microcontroller and Ethernet controller. For very ... See full document

17

Proposed protocol for secured multi path routing in ad hoc networks

Proposed protocol for secured multi path routing in ad hoc networks

... exposures of ad hoc routing protocols are due to two different types of attacks: active and passive ...lack of cooperation with the purpose of energy ...aim of damaging other ... See full document

6

Show all 10000 documents...