Tags
security
evaluation of performance
sip
ad hoc
dsr
manet
cryptosystem
key generation
decryption
verilog
rsa
encryption
implementation
modular exponentiation
cobit
security metrics
service level agreement
information security
cloud computing
cryptographic criteria
boolean functions
vectorial boolean functions
inference engine (ie)
knowledge base (kb)
human resource management
decision support system (dss)
and neural network
mcac
secure sandbox
component
cloud security architecture
cloud
tcp/ip
protocol
cross layer
cl-pea
routing protocol
wsns
energy aware
transmission
wireless sensor networks
osi model
availability
denial of service (dos)
scalability
human factors
performance
carrier applications
long tail
sliding mode control
artificial intelligence
ga
induction motor
pi control
routing
vanet
link breakage prediction
wormhole attack
ad hoc on-demand distance vector
dynamic source routing
mobile ad-hoc network
constant bit rate.
See more
Documents
(14)Tags
security
evaluation of performance
sip
ad hoc
dsr
manet
cryptosystem
key generation
decryption
verilog
rsa
encryption
implementation
modular exponentiation
cobit
security metrics
service level agreement
information security
cloud computing
cryptographic criteria
boolean functions
vectorial boolean functions
inference engine (ie)
knowledge base (kb)
human resource management
decision support system (dss)
and neural network
mcac
secure sandbox
component
cloud security architecture
cloud
tcp/ip
protocol
cross layer
cl-pea
routing protocol
wsns
energy aware
transmission
wireless sensor networks
osi model
availability
denial of service (dos)
scalability
human factors
performance
carrier applications
long tail
sliding mode control
artificial intelligence
ga
induction motor
pi control
routing
vanet
link breakage prediction
wormhole attack
ad hoc on-demand distance vector
dynamic source routing
mobile ad-hoc network
constant bit rate.
See more