Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1
zadetkov: 2
1.
  • Security and Performance of Elliptic Curve Cryptography in Resource-limited Environments: A Comparative Study
    Raya, Ali; Mariyappn, K. 2020 15th International Conference for Internet Technology and Secured Transactions (ICITST), 2020-Dec.-8
    Conference Proceeding

    Nowadays, the usage of constrained-resources devices like sensors and IoT devices are increasing rapidly. These devices often deal with sensitive data and simultaneously have limited storage and low ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
2.
  • A modified EAACK-Intrusion ... A modified EAACK-Intrusion Detection system for MANETs
    Girija, G.; Sumithra, M. G.; Brindha, G. ... 2013 Fifth International Conference on Advanced Computing (ICoAC), 2013-Dec.
    Conference Proceeding

    In the recent years Mobile Ad-hoc Network is emerging as a very popular technology in the wireless network. Because of its dynamic topology and its infrastructure less architecture, it is vulnerable ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM

Nalaganje filtrov