Search

Your search keyword '"Zulkarnain, Zuriati"' showing total 122 results

Search Constraints

Start Over You searched for: Author "Zulkarnain, Zuriati" Remove constraint Author: "Zulkarnain, Zuriati"
122 results on '"Zulkarnain, Zuriati"'

Search Results

4. An enhanced congestion control algorithm for LEO satellite networks

9. Efficient resource management for uplink scheduling in IEEE 802.16e standard

10. A review on heuristics for addition chain problem: towards efficient public key cryptosystems

11. A spawn mobile agent itinerary planning approach for energy-efficient data gathering in wireless sensor networks

12. TruFiX: a configurable trust-based cross-layer protocol for wireless sensor networks

16. FuGeF: a resource bound secure forwarding protocol for wireless sensor networks

17. A firefly-inspired scheme for energy-efficient transmission scheduling using a self-organizing method in a wireless sensor network

18. A scalable neighbor-based routing protocol for mobile ad hoc networks

20. Cooperation stimulation mechanisms for wireless multihop networks: a survey

21. Mobility and handover technique in heterogeneous wireless networks

22. An efficient battery lifetime aware power saving (EBLAPS) mechanism in IEEE 802.16e networks

23. A comprehensive survey of the current trends and extensions for the proxy mobile IPv6 protocol

24. A QoS-Aware CAC with bandwidth reservation and degradation scheme in IEEE 802.16e networks

25. Attacks, vulnerabilities and security requirements in smart metering networks

26. A forwarding strategy for DWSIGF routing protocol

29. Fast handoff scheme for cluster-based proxy mobile IPv6 protocol

30. Enhanced tight finite key scheme for quantum key distribution (QKD) protocol to authenticate multi-party system in cloud infrastructure

31. A low cost route optimization scheme for cluster-based proxy MIPv6 protocol

32. Energy efficient on aspect of clock synchronization in a wireless sensor network

33. Static and mobile data gathering techniques in Wireless Sensor Networks: a survey

34. Primitive structural method for high capacity text steganography

35. Predetermined path of mobile data gathering in wireless sensor networks based on network layout

36. Increase throughput of CCM security mode using MKP

37. No-Go theorems and quantization

38. Parallelizing GF (p) montgomery elliptic curve crypto-system operations to improve security and performance.

39. Shorter addition chain for smooth integers using decomposition method.

40. Efficiency and fairness of new-additive increase multiplicative decrease congestion avoidance and control algorithm

41. Applying packet generator for secure network environment

42. Performance evaluation of routing with load-balancing in multi-radio wireless mesh networks

43. An improved binary method for scalar multiplication in elliptic curve cryptography

44. On the delay and link utilization with the new-additive increase multiplicative decrease congestion avoidance and control algorithm

45. UPEM : user-centered privacy evaluation model in pervasive computing systems.

46. Performance analysis of random-based mobility models in MANET routing protocol.

47. Implemetation of BB84 quantum key distribution protocol’s with attacks.

48. Experimental evaluation of bottleneck link utilization with new-additive increase multiplicative decrease congestion avoidance and control algorithm.

49. Fairness Of the TCP-based new AIMD congestion control algorithm.

50. Comparison study of transmission control protocol and user datagram protocol behavior over multi-protocol label switching networks in case of failures.

Catalog

Books, media, physical & digital resources