4 Questions 25 Answers 0 Followers
Questions related from Mohamed Amine Ferrag
We have proposed security schemes that use asymmetric ciphers / symmetric ciphers for some types of wireless networks. To determine the amount of overhead that a security protocol can introduce in...
10 October 2014 8,468 5 View
The security is now a major issue in our economy, hence the need to revisit the concepts and terms related to safety in order to protect themselves effectively against malicious adversaries. In...
06 August 2014 4,588 4 View
In queueing theory, a discipline within the mathematical theory of probability, an M/G/k queue is a queue model where arrivals are Markovian (modulated by a Poisson process), service times have a...
31 July 2014 6,629 5 View
Vehicle-to-grid (V2G) describes a system in which plug-in electric vehicles, such as electric cars (BEVs) and plug-in hybrids (PHEVs), communicate with the power grid to sell demand response...
27 July 2014 7,286 8 View