• No results found

[PDF] Top 20 Secure Data Transfer and 802.11 Channel Usage in Networking

Has 10000 "Secure Data Transfer and 802.11 Channel Usage in Networking" found on our website. Below are the top 20 most common "Secure Data Transfer and 802.11 Channel Usage in Networking".

Secure Data Transfer and 802.11 Channel Usage in Networking

Secure Data Transfer and 802.11 Channel Usage in Networking

... ABSTRACT: Data exchange rate is an estimation of the measure of information sent between two focuses on a system in a given time ...their data and information to the assistance of remote transmission some ... See full document

6

Secure data transfer using visible light communication Technique

Secure data transfer using visible light communication Technique

... [9] In this paper author say Visible light communication is a creative approach to combine illumination, wireless communication, and novel play patterns for connected toys. Since it can be implemented at low cost with ... See full document

6

Introduction to IEEE 802 11 Rogue Access Point Detection Mechanism Using Covert Channel

Introduction to IEEE 802 11 Rogue Access Point Detection Mechanism Using Covert Channel

... in networking that are damaging a secure network have been studied till ...and data theft and other attacks can be implanted with the help of an ...covert channel over transport Layer of ... See full document

8

Big Data Approach towards Networking, Data Transfer, IOT and Security: A Review

Big Data Approach towards Networking, Data Transfer, IOT and Security: A Review

... of data is collected in regular basis from sensor networks that are normally stored in local databases or public cloud ...storage. Data generated by sensor networks can be in many different formats such as ... See full document

5

Universal Networking Hub For Personalized Transfer Of Data In A Cloud Environment

Universal Networking Hub For Personalized Transfer Of Data In A Cloud Environment

... Personal cloud is a fascinating piece of technology. The idea of storing everything in a remote location has a great impact in modern life. We don’t need to bother about carrying storage devices everywhere we go. That ... See full document

13

FRCC Secure Transfer & Storage Infrastructure. Training for new data transfer process

FRCC Secure Transfer & Storage Infrastructure. Training for new data transfer process

... • Select or highlight the evidence folder that contains all files to be encrypted, right click to access windows content menu. Select the menu option “More GpgEX options”, then se[r] ... See full document

79

Secure storage and transfer of data in a smart lock system

Secure storage and transfer of data in a smart lock system

... Generally speaking, a strong advantage of the system described in this work, over most of the other smart locks on the market, is that a user and the lock do not share any secrets with each other. The user does not play ... See full document

72

LTE and IEEE 802 11p for vehicular networking: a performance evaluation

LTE and IEEE 802 11p for vehicular networking: a performance evaluation

... Higher penetration level, ease in testing and dep- loyment, multiple connectivity modalities, and several built-in sensors motivated Park et al. to develop VoCell [3], a smartphone-based vehicular networking ... See full document

15

Secure Ad Hoc Networking

Secure Ad Hoc Networking

... 1. Introduction Our perception of the Internet and network access habits have changed significantly over the last few years, with 60 million laptop computers in the US, 70% of the 45 million business travelers carrying ... See full document

5

A Secure Reversible Data Hiding With Optimal Value Transfer

A Secure Reversible Data Hiding With Optimal Value Transfer

... the data used to recover the ideal exchange network at collector side, which incorporates the histogram contrast, the weights and the emphasis number, ought to be likewise implanted into the host ... See full document

10

Handoff optimization in 802 11 wireless networks

Handoff optimization in 802 11 wireless networks

... and channel utilization [1], are the most commonly used performance ...[12-14]. Channel interference may also be used as a physical layer indicator, as an MN attempts to associate with the AP whose ... See full document

16

Fast Handoff for 802 11 Wireless Network

Fast Handoff for 802 11 Wireless Network

... The NG can be provided using a server to save the network topology as used by [16]. However, using cen- tralized server to save the static NG files means that any server failure or topology change occurred without up- ... See full document

7

FRCC Secure Data Transfer. Users Guide V1.0

FRCC Secure Data Transfer. Users Guide V1.0

... evidence. Evidence deposited in SW (90%) is used for all sensitive evidence and SV is used by those entities that considers some of their CIP data most sensitive (usually 10% is firewall configurations and ... See full document

22

Error Resilient IPTV for an IEEE 802 16e Channel

Error Resilient IPTV for an IEEE 802 16e Channel

... that data partitioning with FEC protec- tion, when used without redundancy, is insufficient to bring the video quality to above 31 dB, that is to a good ...rateless channel coding scheme but also the ... See full document

10

secure Audio Data Transfer Over Internet Using Steganography

secure Audio Data Transfer Over Internet Using Steganography

... Encryption: For audio file encryption enter the secret speech signal. This process involves adding high frequency noise bits at low frequency components of the signal. Use of Least significant bits embedding method to ... See full document

6

MULTI-LAYERED RGB  BASED SECURE TECHNIQUE FOR DATA TRANSFER.

MULTI-LAYERED RGB BASED SECURE TECHNIQUE FOR DATA TRANSFER.

... Network Security has become very important in today’s world, as a result of which various methods are adopted to bypass it. Network administrators need to keep up with the recent advancements in both the hardware and ... See full document

8

Trust Management Schemes for Secure Data Transfer in MANETs : A Survey

Trust Management Schemes for Secure Data Transfer in MANETs : A Survey

... Delay/Disruption Tolerant Networks (DTNs) were identified as one of the main areas in the field of wireless communication, wherein sparseness and delay are unusually high. Using reputation-based trust management system ... See full document

7

Cloud To Cloud Data Transfer Using Secure Erasure Method

Cloud To Cloud Data Transfer Using Secure Erasure Method

... outsourced data confidentiality and integrity verification, the clients scramble their data hinders before transferring them to Cloud A by using the enhanced BCP encryption conspire and process the ... See full document

6

Linear Approximation Model Throughput Performance Analysis of IEEE 802 11 Distributed Coordinated Function in Wireless Lossy Channel

Linear Approximation Model Throughput Performance Analysis of IEEE 802 11 Distributed Coordinated Function in Wireless Lossy Channel

... A model that calculates the throughput, average packet delay, and packet drop probability has been proposed in [19], [20]. The authors considered the channel bit errors and packet retry limits of the basic access ... See full document

8

Online Social Networking: Usage in Adolescents

Online Social Networking: Usage in Adolescents

... social networking (OSN) has played a significant role on the relationship among college ...of usage of OSN sites by students of professional colleges in terms of duration and dependency and to find out the ... See full document

6

Show all 10000 documents...