ISSN

Displaying 31 - 40 of 124 results

  • A Survey on Vehicular Mobility Modeling: Flow Modeling

    White Papers // Nov 2012 // provided by ISSN

    Motion or movement patterns of vehicles communicating wirelessly play an important role in the simulation based evaluation of Vehicular Ad-hoc NETworks (VANETs). It is to know that recent research about mobility modeling has given direction for vehicular network study still to obtain realistic behavior of vehicles; developments in this area ...

    Download Now
  • Zero Knowledge Password Authentication Protocol

    White Papers // Nov 2012 // provided by ISSN

    In many applications, the password is sent as clear text to the server to be authenticated thus providing the eavesdropper with opportunity to steal valuable data. This paper presents a simple protocol based on zero knowledge proof by which the user can prove to the authentication server that he has ...

    Download Now
  • A New Approach for Instigating Security Using Single Zoom Mouse Click Graphical Password

    White Papers // Nov 2012 // provided by ISSN

    Due to growing hazards to networked computer system, there is great need for security innovations. Authentication is the process of security to information. User authentication is one of the significant topics in information security. Commonly used authentication is alphanumeric passwords, biometrics and smart card. At present day upcoming popular method ...

    Download Now
  • Efficient Probe Station Placement and Probe Set Selection for Fault Localization

    White Papers // Nov 2012 // provided by ISSN

    Network fault management has been a focus of research activity with more emphasis on fault localization - zero down exact source of a failure from set of observed failures. Fault diagnosis is a central aspect of network fault management. Since faults are unavoidable in communication systems, their quick detection and ...

    Download Now
  • Hybrid Channel Allocation in Wireless Cellular Networks

    White Papers // Nov 2012 // provided by ISSN

    The enormous growth of mobile telephone traffic, along with the limited number of channels available, requires efficient reuse of channels. Channel allocation schemes can be divided into three categories: Fixed Channel Allocation (FCA), Dynamic Channel Allocation (DCA) and Hybrid Channel Allocation (HCA). In HCA, channels are divided into two disjoint ...

    Download Now
  • Signal Strength and Energy Aware Reliable Route Discovery in Manet

    White Papers // Nov 2012 // provided by ISSN

    Frequent changes in network topology and confined battery capacity of the mobile devices are the main challenges for routing in ad-hoc networks. In this paper, the authors propose a novel, Signal strength and Energy Aware routing protocol (SEA-DSR), which directly incorporates signal strength and residual battery capacity of nodes into ...

    Download Now
  • Cyber Security Solutions for DLMS Meters Using GSM/GPRS Technology

    White Papers // Nov 2012 // provided by ISSN

    The Smart meters are used in the areas of generation, transmission, distribution and consumption. The capabilities of smart meter systems and grid networks, such as distributed intelligence and broadband capabilities can greatly enhance efficiency and reliability, but they may also create much new vulnerability if not deployed with the appropriate ...

    Download Now
  • Communicating with an Energy Meter Using IEC 62056 Through TCP/IP Protocol

    White Papers // Nov 2012 // provided by ISSN

    Device Language Message Specification (DLMS) is an application layer protocol designed to support messaging to and from energy distribution devices in a computer integrated environment. COSEM, the COmpanion Specification for Energy Metering, addresses the meter as an integrated part of a commercial process, which starts with the measurement of the ...

    Download Now
  • An Efficient Chaos-Based Optimization Algorithm Approach for Cryptography

    White Papers // Nov 2012 // provided by ISSN

    The utmost negative impact of advancement of technology is an exponential increase in security threats, due to which tremendous demand for effective electronic security is increasing importantly. The principles of any security mechanism are confidentiality, authentication, integrity, non-repudiation, access control and availability. Cryptography is an essential aspect for secure communications. ...

    Download Now
  • Survey of Vehicle Ad-Hoc Network

    White Papers // Nov 2012 // provided by ISSN

    In car network enable the direct communication in ad-hoc network among the car and between the car and road side communication device. the ad hoc networking provides a spontaneous and direct communication of a car with other cars or with fixed road-side access points in its vicinity. The communication is ...

    Download Now