Author(s): Dina Omar, Ahmed Khedr
Author(s): Esmael Verano Maliberan
Keyword(s): SHA1, hashing, client-server communication, modified SHA1, hacking, brute force, rainbow table
Author(s): Mohammed Saber, Abdessamad El Rharras, Rachid Saadane, Hatim Kharraz Aroussi, Mohammed Wahbi
Author(s): Zouhair Chiba, Noreddine Abghour, Khalid Moussaid, Amina El omri, Mohamed Rida
Author(s): Bongisizwe Erasmus Buthelezi, Maredi Mphahlele, Deon Deon Du Plessis, Solly Maswikaneng, Topside Mathonsi
Keyword(s): NTRP, ZTR, Healthcare Monitoring Systems, Ambient Assisted Living
Author(s): A Basnet, Abeer Alsadoon, P.W.C Prasad, Omar Hisham Alsadoon, Linh Pham
Author(s): Ahmed Jedidi
Keyword(s): Wireless sensor network, Cluster, Lifetime, Residual energy, Routing, Balance workload
Author(s): Mohammed Abdullah Alsaedi
Keyword(s): Chaos, Chua circuit, Decryption, Encryption, Image processing
Author(s): Deris Stiawan, Diky Aryandi, Ahmad Heryanto, Tri Wanda Septian, Farkhana Muchtar
Author(s): Felomino P. Alba, Enrique D. Festijo, Ruji P. Medina
Author(s): Hamza Toulni, Mounia Miyara, Benayad Nsiri, Mohcine Boudhane
Keyword(s): Vehicular Ad-hoc Networks, traffic flow, traffic information systems, SUMO
Keyword(s): Cloud Computing, Security, Inter-VM, DPI, DPDK, Blockchain, Inter-VM traffic, Virtualization
Author(s): Mohammed Falah Abood Salman, Leili Farzinvash
Author(s): Mohamed El Ghazouani, Moulay Ahmed El Kiram, Latifa Er-Rajy
Keyword(s): Blockchain, Integrity, Public Auditing, Deduplication, Multi-Agent Systems
Author(s): Alaa Al-Nusirat, Feras Hanandeh, Mohammad Kamel Kharabsheh, Mahmoud Al-Ayyoub, Nahla Al-dhfairi
Author(s): Dalveer Kaur, Neeraj Kumar
Author(s): Rafat Ahmed Alhanani, Jaafar Abouchabaka, Rafalia Najat
Keyword(s): UAVs, Network security, Denial of service attacks, Wi-Fi
Author(s): Muhammad Biben Triadi, Doan Perdana, Rendy Munadi, Li Wenzao
Author(s): Amjad Y. Hendi, Majed O. Dwairi, Ziad A. Al-Qadi, Mohamed S. Soliman
Keyword(s): AES, DES, LED, encryption time, decryption time, security level
Keyword(s): Relay Selection, Power Allocation, Fuzzy logic, Cooperative Networks, Adaptive Data Rate
Author(s): Mishall Al-Zubaidie, Zhongwei Zhang, Ji Zhang
Keyword(s): ECDSA, coordinate system, fault attack, scalar multiplication, Security
Author(s): Zheng Wei Clement Chan, Chai Wen Chuah, Janaka Alawatugoda
Author(s): Lyamine Guezouli, Kamel Barka, Souheila Bouam, Abdelmadjid Zidani
Keyword(s): Mobility Model, Wireless sensor network, Random Waypoint, Routing
Author(s): G Vijaya Kumar, C Shoba Bindu
Keyword(s): Wireless Mesh Networks, AP selection, User association
Author(s): Abdelkabir Sahnoun, Ahmed Habbani, Jamal El Abbadi
Keyword(s): Energy Efficient, MANET, Olsr, Path Reliability
Author(s): Shahid Bashir, M Salman Khan, Khadim Ullah Jan, Sadiq Ullah
Keyword(s): Body Area Networks, Wearable antenna, High Impedance surface, Specific Absorption Rate, EBG, AMC
Author(s): Mohsin Khan, Majid Ashraf, Haseeb Zafar, Tufail Ahmad
Keyword(s): Femtocell, Handover, interference, Macro-cell, Hand-In, Mobility Management
Author(s): A.Ajina , Mydhili K.Nair
Author(s): Azuan Ahmad, Norbik Bashah Idris, Mohd Nazri Kama
Author(s): Rastislav Róka, Pavol Šalík
Author(s): Nyoman Gunantara, Agus Dharma
Author(s): R.Kavitha , Dr.G.Padmavath
Author(s): Ramesh Kumar, Ayaz Hussain, Abdul Aziz, Inwhee Joe
Author(s): Doan Perdana, Favian Dewanta, Ig Prasetya Dwi Wibawa
Keyword(s): Low rate, Wireless sensor network, Extending Monitoring Area, Relay nodes