Digital Library


Search: "[ author: ar ]" (281)

  1. Guess and Determine Attack on Bivium

  2. Handling Malicious Flooding Attacks through Enhancement of Packet Processing Technique in Mobile Ad Hoc Networks

  3. Ensuring Anonymity for LBSs in Smartphone Environment

  4. A Clustering Protocol with Mode Selection for Wireless Sensor Network

  5. A Single Mobile Target Tracking in Voronoi-based Clustered Wireless Sensor Network

  6. Efficient Server Virtualization using Grid Service Infrastructure

  7. Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques

  8. Security Properties of Domain Extenders for Cryptographic Hash Functions

  9. On the Handling of Node Failures: Energy-Efficient Job Allocation Algorithm for Real-time Sensor Networks

  10. Stakeholders Driven Requirements Engineering Approach for Data Warehouse Development