Search Results - "Noshairwan, W."

  • Showing 1 - 5 results of 5
Refine Results
  1. 1

    Warnings for Disjoint Knowledge Omission in Ontologies by Qadir, M.A., Noshairwan, W.

    “…Structured knowledge is the most important component of semantic based information systems required to automate intelligent tasks which are normally performed…”
    Get full text
    Conference Proceeding
  2. 2

    Seamless vertical handoff using Authentication Certificate in GPRS-WLAN tightly coupled integrated networks by Usman, M., Noshairwan, W., Gilani, M., Irshad, A., Irshad, E.

    “…Authentication is a key requirement in security of integrated wireless networks. A Mobile Node (MN) requires to be re-authenticated whenever it performs…”
    Get full text
    Conference Proceeding
  3. 3

    Certificate chain based authentication in MANETS using 4th generation technologies by Irshad, A., Noshairwan, W., Shafiq, M., Khan, A.W., Usman, M., Irshad, E.

    “…MANET security is becoming a challenge for researchers with the lapse of time. The infrastructure-less networks gives rise to authentication and key-management…”
    Get full text
    Conference Proceeding
  4. 4

    Authentication of Nodes among Different Symmetric Key Groups in MANETs Using 4G Technologies by Sheikh, A.I., Noshairwan, W., Rashid, M., Gilani, S.M., Irshad, E., Usman, M.

    “…MANET security has long been an issue for its infrastructure-less nature. The sort of networks gives rise to authentication and key-management problems in…”
    Get full text
    Conference Proceeding
  5. 5

    The Use of Z Language for Multimedia Systems by Latif, M.B., Noshairwan, W., Tariq, M.-u.-d., Malik, Z.I.

    “…Recently, there is a growing trend towards the use of multimedia in software systems for different purposes and safety critical systems are no exception to…”
    Get full text
    Conference Proceeding