Found: 10
Select item for more details and to access through your institution.
Simulation and numerical analysis of SOA- based all optical NAND gate for high data rate communication.
- Published in:
- Journal of the National Science Foundation of Sri Lanka, 2023, v. 51, n. 2, p. 225, doi. 10.4038/jnsfsr.v51i2.11080
- By:
- Publication type:
- Article
Enhancement of Multifrequency Microwave Tomography Breast Imaging System using Flexible Preconditioner Based Krylov Subspace Methods.
- Published in:
- Applied Computational Electromagnetics Society Journal, 2022, v. 37, n. 6, p. 664, doi. 10.13052/2022.ACES.J.370602
- By:
- Publication type:
- Article
Hexagonal Clustered Trust Based Distributed Group Key Agreement Scheme in Mobile Ad Hoc Networks.
- Published in:
- Wireless Personal Communications, 2020, v. 114, n. 4, p. 2955, doi. 10.1007/s11277-020-07512-x
- By:
- Publication type:
- Article
Path optimization of box-covering based routing to minimize average packet delay in software defined network.
- Published in:
- Peer-to-Peer Networking & Applications, 2020, v. 13, n. 3, p. 932, doi. 10.1007/s12083-019-00855-8
- By:
- Publication type:
- Article
Defending against false data attacks in 3D grid-based MANET using soft computing approaches.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2019, v. 23, n. 18, p. 8579, doi. 10.1007/s00500-019-03899-3
- By:
- Publication type:
- Article
An Efficient Genetic Based Broadcast Stateless Group Key Management Scheme with Dynamic Rekeying in Mobile Ad-Hoc Networks.
- Published in:
- Wireless Personal Communications, 2019, v. 105, n. 3, p. 857, doi. 10.1007/s11277-019-06125-3
- By:
- Publication type:
- Article
Dynamic Group Key Management with Efficient Rekeying Schemes for PKI MANET System.
- Published in:
- Adhoc & Sensor Wireless Networks, 2019, v. 43, n. 3/4, p. 261
- By:
- Publication type:
- Article
Mobility Aware Clustering Scheme with Bayesian- Evidence Trust Management for Public Key Infrastructure in Ad Hoc Networks.
- Published in:
- Wireless Personal Communications, 2018, v. 99, n. 1, p. 371, doi. 10.1007/s11277-017-5107-1
- By:
- Publication type:
- Article
Efficient trust management with Bayesian-Evidence theorem to secure public key infrastructure-based mobile ad hoc networks.
- Published in:
- EURASIP Journal on Wireless Communications & Networking, 2018, v. 2018, n. 1, p. 0, doi. 10.1186/s13638-017-1001-5
- By:
- Publication type:
- Article
Detection and prevention of spam over Internet telephony in Voice over Internet Protocol networks using Markov chain with incremental SVM.
- Published in:
- International Journal of Communication Systems, 2017, v. 30, n. 11, p. n/a, doi. 10.1002/dac.3255
- By:
- Publication type:
- Article