1 - 6 of 6 articles
Mobile adhoc networks are widely used in many applications. One of the challenges in MANET is the security. Providing authentication is one of the primary principles of network security. Digital certificates are distributed to the nodes in the networks. Certificates are revoked from misbehaving...
Cloud computing is a recent trend for modifying the computing technique strongly. The cloud storage assets will be recurrently accessed. The method works based on a black box method that has difficulty to correlate acquired data for internal resource management techniques. The simulation is not...
Nowadays, Wireless Sensor Networks (WSNs) are widely used in all surveillance and domestic applications. Secure data gathering is a major concern in WSN in the presence of intruders. In existing works, secured data transmission was achieved through symmetric or asymmetric cryptographic schemes....
One-way road networks can be designed with the aid of computer program. However, the use of genetic algorithm in such design is new. This research paper presents a new approach to search out and determine appropriate travel directions for the one-way road network. The main objective is to...
Cloud computing has become a commercial business environment for small and large scale industries to avail the resources. Cloud application requests are processed dynamically to access resource utilisation based on the diverse demand for cloud resources. The expected allocation of resources to...
Identity Verification Based Cryptosystem (IDVBC) mechanism is implemented here for providing a novel and secure data transmission among nodes. Here, token-based node identity verification along with certificates and data encoding mechanism is carried out to reduce the complexity in wireless...
Read and print from thousands of top scholarly journals.
Continue with Facebook
Log in with Microsoft
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.