• No results found

Distributed Network

Authentication Schemes for Open Distributed Network: A Classification

Authentication Schemes for Open Distributed Network: A Classification

... .Distributed Network, such as sensor and mobile ad hoc networks, must conquer a numerous of security challenges to realize their potential in both civil and military ...a Distributed Network ...

5

Performance of Multirate Multicast in Distributed Network

Performance of Multirate Multicast in Distributed Network

... a network, that network is scalable i.e., in the network any new user or receiver can ...cluster network can join different cluster or ...a distributed network and well connected ...

9

A Study of Distributed Network Management Architectures

A Study of Distributed Network Management Architectures

... the network system. A way of characterizing network management is FCAPS - Fault, Configuration, Accounting, Performance and Security ...of network management also include controlling and monitoring ...

9

Detecting Distributed Network Traffic Anomaly with Network-Wide Correlation Analysis

Detecting Distributed Network Traffic Anomaly with Network-Wide Correlation Analysis

... the network to construct subdetection ...instance, distributed attack detection system (DAD) [4, 5], Cooperative Intrusion Traceback and Response Architecture (CITRA) [6, 7], and so ...collaborative ...

11

Performance Analysis of DTSA in Distributed Network

Performance Analysis of DTSA in Distributed Network

... Clocks may run at different speeds and drift apart to report different times. Two events on two different systems may actually occur at exactly the same time and thus be tagged with identical timestamps, there was no ...

9

Partial Temporal Ordering in Distributed Network

Partial Temporal Ordering in Distributed Network

... a distributed system an application may have several processes that run concurrently on multiple nodes of the ...such distributed applications require that the clocks of the nodes are synchronized with each ...

5

Sigmoid(x): secure distributed network storage

Sigmoid(x): secure distributed network storage

... webmail. Network providers can provide centralised solutions, but that returns us to the first ...scalable, distributed, secure storage mechanism which shares data storage between the users ...

5

Distributed Network Management Architectures: A Review

Distributed Network Management Architectures: A Review

... Low scalability and flexibility of client server introduces moving toward distributed or decentralization of network system [4]. In this kind of communicating applications with approaches like Management by ...

7

Distributed LQR Methods for Networks of Non-Identical Plants

Distributed LQR Methods for Networks of Non-Identical Plants

... complementary distributed linear quadratic regulator (LQR) methods applied to networks of identical plants are extended to the non-identical plant ...a distributed control scheme whose stability is ...

9

MANAGING INTRUSION DETECTION AND DIAGNOSIS AS A SERVICE IN CLOUD COMPUTING

MANAGING INTRUSION DETECTION AND DIAGNOSIS AS A SERVICE IN CLOUD COMPUTING

... Each service level security concerns that need to address. The Cloud computing are important Vulnerable targets for intruder attacks. The reason behind that distributed network environment. For the ...

5

Privacy Protection for Case Sheet Using Multiple Platform

Privacy Protection for Case Sheet Using Multiple Platform

... In this paper, we have investigated the security and privacy issues in the medical distributed data collection, storage and queries and presented a complete solution for privacy-preserving medical ...

5

Blockchain Enabled Privacy Security Module for Sharing Electronic Health Records (EHRs)

Blockchain Enabled Privacy Security Module for Sharing Electronic Health Records (EHRs)

... Blockchain distributed ledger, which is known as one emerging technology, is able to solve this problem by providing a decentralized backend that multiple parties can view and edit consistently without the demand ...

14

Framework for Client-Server Distributed Database System for an Integrated Pay Roll System

Framework for Client-Server Distributed Database System for an Integrated Pay Roll System

... a distributed pay roll ...a distributed pay roll system for local government areas in Bayelsa ...a distributed network. The client/server distributed network architecture is used ...

9

ch22_Internet_Authentication.pdf

ch22_Internet_Authentication.pdf

...  provides centralised private-key third-party provides centralised private-key third-party authentication in a distributed network. authentication in a distributed network[r] ...

19

Advances in Network & Distributed Systems Security pdf

Advances in Network & Distributed Systems Security pdf

... Based on the development of new technology such as smart cards, a new security protocols SET has emerged, whose purpose is to provide authentication and secure transactions between communicating parties [SET 97]. The ...

218

E-BEENISH: Enhanced Balanced Energy Efficient Network Integrated Super Heterogeneous Protocol For WSNAbhijit Singh, Shashi B. Rana

E-BEENISH: Enhanced Balanced Energy Efficient Network Integrated Super Heterogeneous Protocol For WSNAbhijit Singh, Shashi B. Rana

... of network by rotating the role of CH among all ...during network evolution where the advanced nodes have similar residual energies as the normal ...Enhanced Distributed Energy Efficient Clustering ...

5

Distributed adaptive primal algorithm for P2P ETS over unreliable communication links

Distributed adaptive primal algorithm for P2P ETS over unreliable communication links

... The topmost plot of Figures 3 and 4 show the convergence of the transmitted messages, the middle plots show the evolution of the total transmitted messages on each link while, the lower plots show the evolution of the ...

17

A COMPARATIVE STUDY OF 1G, 2G, 3G AND 4G

A COMPARATIVE STUDY OF 1G, 2G, 3G AND 4G

... cellular network or mobile network is a radio network distributed over land areas called cells, each served by at least one fixed-location transceiver, known as a cell site or base ...cellular ...

16

IJCSMC, Vol. 3, Issue. 7, July 2014, pg.34 – 40 RESEARCH ARTICLE A Review on Artificial Bee Colony in MANET

IJCSMC, Vol. 3, Issue. 7, July 2014, pg.34 – 40 RESEARCH ARTICLE A Review on Artificial Bee Colony in MANET

... sensor network. It can avoid network congestion and fast consumption of energy of individual ...of network, during data transmission in a efficient ...

7

Network Load Balancing Using Distributed Algorithm

Network Load Balancing Using Distributed Algorithm

... the network stack and never reach the ...second network adapter card to each cluster host. In this configuration, Network Load Balancing is bound to the network adapter on the subnet that ...

8

Show all 10000 documents...

Related subjects