نتایج جستجو برای: group based handover authentication
تعداد نتایج: 3726165 فیلتر نتایج به سال:
Next generation mobile networks are expected to integrate multiple drones organized in Flying Ad Hoc Networks (FANETs) support demanding and diverse services. The highly should always be connected the network order satisfy strict requirements of upcoming applications. As number increases, they burden with management signaling continuous monitoring during data transmission. Therefore, designing ...
An efficient roaming service over wireless networks is essential for mobile users. It allows users to seamlessly access the services provided by home agent without losing connectivity when they visit a foreign network. This handover communication happens with help of agent. In most cases, between user and occurs an unsecured channel. Therefore, researchers have proposed various authentication s...
BACKGROUND Clinical handover is an important process for the transition of patient-care responsibility to the next healthcare provider, but it may divert the attention of the team away from active patients. This is challenging in the Emergency Department (ED) because of highly dynamic patient conditions and is likely relevant in conditions that requires time-sensitive therapies, such as sepsis....
The Extensible Authentication Protocol (EAP) is a generic framework supporting multiple types of authentication methods. The EAP Re-authentication Protocol (ERP) specifies extensions to EAP and the EAP keying hierarchy to support an EAP method-independent protocol for efficient re-authentication between the peer and an EAP re-authentication server through any authenticator. Authenticated Antici...
This paper proposed an authentication system based on low quality palmprint. For implementation of this system, first the features is extracted by using Contourlet and wavelet transforms. In the second phase, some of the features are selected by using Across Group Variance (AGV) filter. In the last phase by using a classification method, the authentication is completed. For classification we ev...
advanced metering infrastructure (ami) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. this study focuses on communication between a smart meter and a server on the utility side. hence, a mutual authentication mechanism in ami is presented based on the elliptic curve cryptography (ecc) and one time signature (ots) consists o...
Vehicle have access to the internet for communications to facilitate the need of mobility management and point of interest distribution in emerging Intelligent Transportation System (ITS) . Therefore, its obvious that by changing the road side unit frequently , may require fast handover management to mobile user (MU) for the configuration of new IP address , however the ongoing session remain u...
the aim of this study has been to find answers for the following questions: 1. what is the effect of immediate correction on students pronunciation errors? 2. what would be the effect of teaching the more rgular patterns of english pronunciation? 3. is there any significant difference between the two methods of dealing with pronuciation errore, i. e., correction and the teaching of the regular ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید