Fuzzy Basis based Network Model

SK Kashyap - International Journals Digital Communication …, 2019 - ecc.journalspub.info
Fuzzy basis is applied to develop a new network model. This network model performs
compactly, efficiently and securely. The new protocol is proposed in this paper. This protocol …

Hybrid intelligence system using fuzzy inference in cluster architecture for secured group communication

M Sayeekumar, GM Karthik, S Puhazholi - Soft Computing, 2019 - Springer
The complication of efficient group communication design in real-world application has been
continuously increasing. More factors have to be taken into account continuously before any …

RFC IN APPROACH MODEL PARADIGM.

VT Atanasov - International Journal on Information …, 2021 - search.ebscohost.com
The problem area in this paper relies on proposed approach model paradigm. According to
this paradigm the networking system development process follows an abstract hierarchy …

[PDF][PDF] Cryptography technology with network security

V Madhukar - International Journal for Recent Development in …, 2020 - academia.edu
Network Security & Cryptography is a concept to protect network and data transmission over
wireless network. Data Security is the main aspect of secure data transmission over …

Research on Network Security Strategy Model

A Lan, B Li, R Huang, X Zhang, G Feng - Frontier Computing: Theory …, 2016 - Springer
Nowadays integrated network ensures the security of information transmission by adding
encrypt, simple authentication and so on, but it lacks effective means to secure the …

[PDF][PDF] Wired vs Wireless Using Advanced Network

M Vijayarani, MN Srividya - International Journal of Engineering …, 2015 - pnrsolution.org
As technology advances in society the need for wired and wireless networking has become
essential. Each of these types of networking has their advantages and disadvantages …

[PDF][PDF] Centralized Network Security Model Using Dynamic Vlan and Client Authentication

L Vokorokos, M Chovanec, O Látka… - … of Computers and …, 2006 - conf.uni-obuda.hu
Computer networks noticed the great progress and an application extension in the last
decades. In the present the quantum of the data is transferred via computer networks. These …

[PDF][PDF] Analysis of network data Encryption & Decryption techniques in communication systems

CJ Ezeofor, AG Ulasi - … Journal of Innovative Research in Science …, 2014 - researchgate.net
This paper presents analysis of network data encryption and decryption techniques used in
communication systems. In network communication systems, exchange of information mostly …

Special issue on recent advances in network and information security-security and communication networks journal

X Cheng, J Yuan, A Tajer, A Hu, W Zhou - 2015 - dro.deakin.edu.au
Special issue on recent advances in network and information security—security and
communication networks journal Page 1 EDITORIAL Special issue on recent advances in …

[PDF][PDF] SECURE DATA TRANSMISSION FOR CRYPTOGRAPHY USING STANDARD FORMAT

M ARULKUMAR - ijarst.in
Network security and cryptography (encryption & decryption) is a concept to protect network
and data transmission over wireless network. Data Security is the main aspect of secure …