Skip to main content
SNOW 3G is a synchronous, word-oriented stream cipher used by the 3GPP standards as a confidentiality and integrity algorithms. It is used as first set in long term evolution (LTE) and as a second set in universal mobile... more
    • by 
    •   5  
      FPGACryptographyVhdlWireless Network Security
They are susceptible to a variety of attacks, including node capture, physical tampering, and denial of service, while prompting a range of fundamental research challenges.
    • by 
    •   17  
      Distributed ComputingPhysicsSecurityWireless Sensor Networks
In this research a survey is conducted that looks into the architecture of VANETs and their areas of application. The architecture is broadly discussed in the introductory part, which also outlines the key role players. The paper also... more
    • by 
    •   7  
      Network SecurityComputer NetworksVehicular Ad Hoc NetworksWireless networks
File System is an important component of a secure operating system. The need to build data protection systems is extremely important in open source operating systems, high mobility hardware systems, and miniaturization of storage devices... more
    • by  and +1
    •   12  
      Information SecurityNetwork SecurityInternational SecurityComputer Security
As in today's date fuel consumption is important in everything from scooters to oil tankers, power consumption is a key parameter in most electronics applications. The most obvious applications for which power consumption is critical are... more
    • by 
    •   18  
      Vlsi DesignWireless CommunicationsWireless Mesh NetworksWireless networks
Today’s wireless networks are vulnerable in many ways (eavesdropping, illegal use, unauthorized access, denial of service attacks, so called warchalking etc). These problems and concerns are one of main obstacles for wider usage of... more
    • by 
    •   12  
      Computer ScienceArtificial IntelligenceMachine LearningNetwork Security
Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes... more
    • by 
    •   20  
      Distributed ComputingPhysicsSecuritySensor Network Security
— Any algorithm is evaluated based on its confusion and diffusion property determining its strength to withstand the intruding attacks. AES (Advanced Encryption Standard), using 128-bit key size has the number of rounds processed over... more
    • by 
    •   3  
      Network SecurityWireless Network SecurityAdvanced Encryption Standards
Wireless (Wi-Fi) networks based on IEEE 802.11 1 family of standards have been spreading its coverage last years and this trend is expected to grow. Every day more and more people use this type of networks to access Internet, company or... more
    • by 
    •   13  
      Artificial IntelligenceMachine LearningNetwork SecurityWireless Sensor Networks
Since the liberalization of the telecommunication sector in Uganda in 1998, the key services have been voice, data and low rate Internet. The backbone link to the rest of the world has been via satellite which is characterized by low... more
    • by 
    •   4  
      Voice over IPWireless networksIPv6Wireless Network Security
Security will play an important role in wireless networks. In the present scenario, 3G and 4G networks have separate security layers but still there is a possibility of certain prominent types of attacks. In this paper, a survey has... more
    • by  and +1
    • Wireless Network Security
In the last few years, many fake websites have developed on the World Wide Web to harm users by stealing their confidential information such as account ID, user name, password, etc. Phishing is the social engineering attacks and currently... more
    • by  and +1
    •   13  
      Computer ScienceInformation TechnologyTechnologyNetwork Security
In Network Security and Cryptography, hash functions play a very important role. To check the Integrity, Authenticity of information or data transmitting between the Seder and receiver party hash algorithms are used. Digital signature... more
    • by 
    •   8  
      Computer ScienceAlgorithmsComputer EngineeringNetwork Security
    • by 
    •   5  
      Network SecurityMobile SecurityWireless Network SecurityCyber Security
With rapid progress in the field of radio technology, Wireless networks have grown to have many beneficial features, the main one is MOBILITY. The downside of these networks is susceptibility to attacks, which has persisted since the very... more
    • by 
    •   6  
      Wireless CommunicationsWireless networksWireless Network SecurityWireless Computing
This paper presents a brief overview of the different cryptographic methods used in mobile networks. The focus here is on the mobile communication standards-1G to 4G. The purpose of this paper is to appreciate the evolution of security... more
    • by 
    •   3  
      Network SecurityCryptographyWireless Network Security
Communication is the basic need and back-bone for development of any society. Societal development and advancement in the electronics & technology led to the development of Wireless based Systems & has become vital for the modern... more
    • by  and +1
    •   7  
      Wireless securityWireless ad-hoc NetworksWi-FiWireless Network Security
Wireless sensor networks (WSNs) have attracted a lot of interest over the last decade in wireless and mobile computing research community. Applications of WSNs are numerous and growing, which range from indoor deployment scenarios in the... more
    • by 
    •   28  
      Distributed ComputingSecurityWireless Sensor NetworksSensor Network Security
Modbus is the de facto standard communication protocol for the industrial world. It was initially designed to be used in serial communications (Modbus RTU/ASCII). However, not long ago, it was adapted to TCP due to the increasing... more
    • by 
    •   16  
      Wireless CommunicationsNetwork SecurityComputer NetworksWireless Sensor Networks
International Journal of Microwave Engineering (JMICRO) is a peer-reviewed, open access journal which invites high quality manuscripts that focuses on Engineering and theory associated with microwave / millimeter-wave technology, guided... more
    • by 
    •   14  
      Optical EngineeringMicrostrip AntennasAntennas & Radio Wave PropagationWireless Sensor Networks
How to reflash older Ubiquity hardware with latest firmware, this removes the ubnt virus and restores the radio to factory default settings.
    • by 
    •   20  
      Wireless CommunicationsWireless Sensor NetworksWireless Mesh NetworksWireless security
International Journal of Computer Networks & Communications (IJCNC) (Scopus, ERA Listed) ISSN 0974 - 9322 (Online); 0975 - 2293 (Print) http://airccse.org/journal/ijcnc.html New Issue: January 2020, Volume 12, Number 1 --- Table... more
    • by 
    •   19  
      Wireless CommunicationsSocial NetworkingNetwork SecurityComputer Networks
Physical Unclonable Functions (PUFs) are promising security primitives for resource-constrained network nodes. The XOR Arbiter PUF (XOR PUF or XPUF) is an intensively studied PUF invented to improve the security of the Arbiter PUF,... more
    • by 
    •   3  
      Network SecurityWireless Sensor Network SecurityWireless Network Security
In this contemporary world, network computing has become one of the major requirements in today’s world. It can be seen in various places such as in home, universities, hospitals, airports, hotels, retail shops, banks, government sectors,... more
    • by 
    •   4  
      Computer NetworksWireless networksWireless Networks (Computer Science)Wireless Network Security
Security Assessment Pada Jaringan Private Wireless LAN
    • by 
    •   5  
      Network SecurityWireless Network SecurityFirewall and network securityNmap
International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all... more
    • by 
    •   13  
      Wireless CommunicationsWireless Sensor NetworksWireless networksWireless Networks (Computer Science)
Wireless communications, nowadays, becomes a vital element of people's daily life. Providing global connectivity in future communication systems via the heterogeneous network opens up many research topics to investigate potentialities,... more
    • by 
    •   17  
      Wireless CommunicationsNetwork SecurityComputer NetworksWireless Sensor Network Security
In recent years, AdHoc networks have been attracting much interest in both academic and industrial communities. International Journal on AdHoc Networking Systems is an open access peer-reviewed journal that serves as a forum to discuss on... more
    • by 
    •   15  
      Wireless CommunicationsVehicular Ad Hoc NetworksWireless Sensor NetworksAdHoc Networks
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications .The journal... more
    • by 
    •   30  
      Wireless CommunicationsNetwork SecuritySensor Network SecurityNext Generation Internet Research
In an enterprise network, it is normal to use multiple dynamic routing protocols for forwarding packets. Therefore, the route redistribution is an important issue in an enterprise network that has been configured by multiple different... more
    • by 
    •   3  
      Computer NetworksWireless Network SecurityInternet Engineering
The paper presents a Riverbed simulator implementation with both routing and medium access control (MAC) protocols for mobile ad-hoc network wireless networks with multi-beam smart antennas (MBSAs). As one of the latest promising antenna... more
    • by 
    •   30  
      Mobile LearningMobile RoboticsWireless CommunicationsMobile Media
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its... more
    • by 
    •   9  
      Information SecurityWireless securityComputer SecurityWireless Sensor Network Security
Wireless technology provides us many benefits like portability and flexibility, increased productivity, and lower installation costs. Wi-Fi networks can be accessed with laptops, mobile phones, cameras, game consoles, and an increasing... more
    • by 
    •   3  
      Computer NetworksNetworks SecurityWireless Network Security
    • by 
    •   7  
      Computer ScienceWireless CommunicationsComputer NetworksWireless Network Security
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal... more
    • by 
    •   17  
      Wireless CommunicationsNetwork SecurityComputer NetworksWireless Sensor Networks
In this paper, we proposed a novel efficient method of analyzing the ergodic channel capacity of the cooperative amplify-and-forward (CAF) relay system. This is accomplished by employing a very tight approximate moment generating function... more
    • by 
    •   18  
      Wireless CommunicationsWireless Sensor NetworksWireless Mesh NetworksWireless security
    • by 
    •   11  
      Open AccessWireless NetworkWireless Network SecurityData Encryption
Wireless communication is the most effective communication to convey audio or video information among the population. It enables the masses to connect throughout the world. Wireless technologies improve the lifestyle of individuals in... more
    • by 
    •   17  
      Mobile Ad Hoc NetworksWireless CommunicationsNetwork SecurityComputer Networks