Search Results - "Noshairwan, W."
-
1
Warnings for Disjoint Knowledge Omission in Ontologies
Published in Second International Conference on Internet and Web Applications and Services (ICIW'07) (01-05-2007)“…Structured knowledge is the most important component of semantic based information systems required to automate intelligent tasks which are normally performed…”
Get full text
Conference Proceeding -
2
Seamless vertical handoff using Authentication Certificate in GPRS-WLAN tightly coupled integrated networks
Published in 2008 4th International Conference on Emerging Technologies (01-10-2008)“…Authentication is a key requirement in security of integrated wireless networks. A Mobile Node (MN) requires to be re-authenticated whenever it performs…”
Get full text
Conference Proceeding -
3
Certificate chain based authentication in MANETS using 4th generation technologies
Published in 2009 2nd IEEE International Conference on Computer Science and Information Technology (01-08-2009)“…MANET security is becoming a challenge for researchers with the lapse of time. The infrastructure-less networks gives rise to authentication and key-management…”
Get full text
Conference Proceeding -
4
Authentication of Nodes among Different Symmetric Key Groups in MANETs Using 4G Technologies
Published in 2009 International Conference on Computer Engineering and Technology (01-01-2009)“…MANET security has long been an issue for its infrastructure-less nature. The sort of networks gives rise to authentication and key-management problems in…”
Get full text
Conference Proceeding -
5
The Use of Z Language for Multimedia Systems
Published in 2007 International Conference on Information and Emerging Technologies (01-07-2007)“…Recently, there is a growing trend towards the use of multimedia in software systems for different purposes and safety critical systems are no exception to…”
Get full text
Conference Proceeding