• Login
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

    All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    LoginRegister

    Discover

    AuthorHemnani, Deepak Manohar (1)Maheshwari, Mayur (1)Mundra, Anil Kumar (1)Patel, Nidhi (1)Sethi, Ankit Kumar (1)Subject
    Access control (5)
    Ad-hoc networks (2)Computer program language (2)MANET (2)Security measures (2)Sensor networks (2)Wireless communication systems (2)Autonomic Computing (1)Centralized Key Management (1)Computer network protocol (1)... View MoreDate Issued
    2011 (5)
    Has File(s)Yes (5)

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-5 of 5

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
    Thumbnail

    Secure data delivery in mobile ad hoc network using multiple paths 

    Maheshwari, Mayur (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
    A mobile ad hoc network (MANET) is a self configurable, self organized, infrastructure less multi hop mobile wireless network.Characteristics of ad hoc network make security a critical issue i.e. any node can join the ...
    Thumbnail

    Performance evaluation of kerberos cross-realm authentication using SIMNET 

    Sethi, Ankit Kumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
    Today, the network is being implemented in such a manner that consist of geographi- cally diverse clients and distributed as well as centralized servers. To prevent unauthorized access to system resources such as servers, ...
    Thumbnail

    Prolog based approach to reasoning about dynamic hierarchical key assignment schemes 

    Mundra, Anil Kumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
    The problem of allowing the higher level users access the information related to lower level is called Hierarchical Access Control Problem. In a hierarchical access control system, users are partitioned into a number of ...
    Thumbnail

    Packet forwarding strategies for cooperation enforcement in mobile wireless ad hoc networks 

    Patel, Nidhi (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
    In self-organized ad hoc networks, all networking functions rely on the contri- bution of the relay nodes. Nodes have to forward packets for each other in order to enable multi-hop communication. In recent years, researchers ...
    Thumbnail

    Generalized data extraction protocol for habitat monitoring applications in WSNs 

    Hemnani, Deepak Manohar (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
    Habitat monitoring applications use WSNs to gather data about environment and migration patterns of animals. This data is used by biologists to analyze the life and behavior of animals in different environments. The ...

    Resource Centre copyright © 2006-2017 
    Contact Us | Send Feedback
    Theme by 
    Atmire NV
     

     


    Resource Centre copyright © 2006-2017 
    Contact Us | Send Feedback
    Theme by 
    Atmire NV