Wdtf: A technique for wireless device type fingerprinting

AK Dalai, SK Jena - Wireless Personal Communications, 2017 - Springer
In this Work, a technique for wireless device type fingerprinting has been introduced. The
technique utilizes the information that revealed as a result of the homogeneity in devices of …

Design of SHA-1 & SHA-2 MIPS processor using FPGA

SS Omran, LF Jumma - … Annual Conference on New Trends in …, 2017 - ieeexplore.ieee.org
According to the wide developments in the area of communications, there is a demand for
secure system for data transmissions. In this paper, a Hash system SHA-1 and SHA-2 …

Design of multithreading SHA-1 & SHA-2 MIPS processor using FPGA

SS Omran, LF Jumma - 2017 8th International Conference on …, 2017 - ieeexplore.ieee.org
According to the wide developments in the area of communications, there is a demand for
secure system for data transmissions. In this paper, a Hash system SHA-1 and SHA-2 …

A Genetic-Fuzzy Approach for Detection of Worm Attack in Ad-Hoc Wireless Networks.

M Reji, PC Raja, C Joseph - Indian Journal of Public …, 2017 - search.ebscohost.com
Ad hoc networks are prone to internal and external attacks due to its complex properties
such as dynamic topologies, no clear line of protection and resource constraints. Intrusion …

[PDF][PDF] Design SHA-2 MIPS Processor Using FPGA

SS Omran, LF Jumma - Conference of Cihan University-Erbil on …, 2017 - researchgate.net
According to the wide developments in the area of communications, there is a demand for
secure system for data transmissions. Hence, a new algorithm and security standards are …