Avoiding Selective Attacks with using Packet Hiding Approaches in Wireless Network
Journal Title: UNKNOWN - Year 2013, Vol 2, Issue 7
Abstract
"We address the problem of selective attacks in wireless networks. In these attacks, the opponent selectively targets specific packets of "
Steganography with Cryptography Technique For Data Hiding
"Now a day’s sharing the information over internet is becoming a critical issue due to security problems. Hence more techniques are needed to protect the shared data in an unsecured channel. In steganography nothing but...
An Efficient Synthesis and Biological Properties of 2- [ (5-Methoxy-1H- Benzimidazol-2-yl) Sulfanyl] -N-Phenylacetamide Motief
A new series of 2-[(5-methoxy-1H-benzimidazol-2-yl)sulfanyl]-N-phenylacetamide have been synthesized by the condensation 2-mercapto-5-methoxybenzemidazole and 2- chloro – N – ( Aryl ) – acetamides. The novel compounds st...
Performance Evaluation of Different Types of CMOS Operational Transconductance Amplifier
Performance Evaluation of Different Types of CMOS Operational Transconductance Amplifier
Simulation of Multi Converter Unified Power Quality Conditioner for Two Feeder Distribution System
In this Project the Power Quality improvement is done for elimination of Sag, Swell and Harmonics for two feeder distribution system by using Multi Converter UPQC. In this system two series voltage source converters and...
Indian Debt Market - A Current Paradigm
Development of long term debt market is critical for the mobilization of the huge magnitude of funding required to finance potential businesses. India has ill-defined long term corporate debt market. Traditionally, bank...