Call for Papers - Ongoing round of submission, notification and publication.
    
  
Home    |    Login or Register    |    Contact CSC
By Title/Keywords/Abstract   By Author
Browse CSC-OpenAccess Library.
  • HOME
  • LIST OF JOURNALS
  • AUTHORS
  • EDITORS & REVIEWERS
  • LIBRARIANS & BOOK SELLERS
  • PARTNERSHIP & COLLABORATION
Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available
(no registration required)

(132.02KB)


-- CSC-OpenAccess Policy
-- Creative Commons Attribution NonCommercial 4.0 International License
>> COMPLETE LIST OF JOURNALS

EXPLORE PUBLICATIONS BY COUNTRIES

EUROPE
MIDDLE EAST
ASIA
AFRICA
.............................
United States of America
United Kingdom
Canada
Australia
Italy
France
Brazil
Germany
Malaysia
Turkey
China
Taiwan
Japan
Saudi Arabia
Jordan
Egypt
United Arab Emirates
India
Nigeria
The Time Efficient Security for Broadcast Networks
Santosh L Deshpande1, N H Ayachit1, Kamaksi Prasad V2
Pages - 11 - 14     |    Revised - 15-4-2008     |    Published - 30-4-2008
Published in International Journal of Computer Science and Security (IJCSS)
Volume - 2   Issue - 2    |    Publication Date - April 2008  Table of Contents
MORE INFORMATION
References   |   Cited By (1)   |   Abstracting & Indexing
KEYWORDS
ABSTRACT
The audit ability and security of the broadcast network and security needs to be enhanced. This article is proposing the security solutions for such networks that are cost effective. The solution also takes care of the reduction of effective bandwidth-delay product. The improvement in terms of a cost effective comparator improves the efficiency and security of such networks. The threats like Eavesdropping, Interception and modification of transmitted data, Spoofing, Denial of service (DoS), Free–loading, and Accidental threats are some of the threats addressed in this article.
CITED BY (1)  
1 H. S. Guruprasad and H. D. Maheshappa , “Dynamic Load Balancing Architecture for Distributed VoD using Agent Technology”, International Journal of Computer Science and Security (IJCSS), 2(5), pp. 13 – 22, 2008.
ABSTRACTING & INDEXING
1 Google Scholar 
2 Academic Journals Database 
3 ScientificCommons 
4 CiteSeerX 
5 iSEEK 
6 Socol@r  
7 ResearchGATE 
8 Libsearch 
9 Bielefeld Academic Search Engine (BASE) 
10 Bielefeld Academic Search Engine (BASE) 
11 Scribd 
12 WorldCat 
13 SlideShare 
14 PDFCAST 
15 PdfSR 
16 Chinese Directory Of Open Access 
REFERENCES
2nd edition Lion Garcia and Indra Wadija Data Communication 2005
A. Escudero, B. Pehrson, E. Pelletta, J.O. Vatn, P. Wiatr, “Wireless access in the lyinglinux. NET infrastructure: Mobile IPv4 integration in a IEEE 802.11b”, 11th IEEE Workshop on Local and
Detecting Wireless LAN MAC Address Spoofing Joshua Wright, GCIH, CCNA 2003
Intel Building Blocks for Wireless LAN Security 2003
Metropolitan Area Networks, LANMAN2001, Co,USA, March 2001.TDM local access published as a white paper by CISCO in 2005
MANUSCRIPT AUTHORS
Mr. Santosh L Deshpande1
SDM College of Engg. and Technology - India
sldeshpande@gmail.com
Mr. N H Ayachit1
BVB College of Engg. and Technology - India
Mr. Kamaksi Prasad V2
JNT University - India


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS
 
You can contact us anytime since we have 24 x 7 support.
Join Us|List of Journals|
    
Copyrights © 2025 Computer Science Journals (CSC Journals). All rights reserved. Privacy Policy | Terms of Conditions