Search Results - (( based verification protocol algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- based verification »
- protocol algorithm »
- implication based »
- java implication »
-
1
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
2
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023“…The PNDT consists of five components: agent's belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent's belief base with new normative protocol. …”
Short Survey -
3
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…Station-to-Station protocol is a protocol based on the Diffie-Hellman key exchange to prevent the man-in-the-middle attack by inserting authentication. …”
Get full text
Get full text
Student Project -
4
-
5
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2013“…The PNDT consists of five components: agent’s belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent’s belief base with new normative protocol. …”
Get full text
Get full text
Article -
6
Dose verification procedures in radiotherapy
Published 1999Get full text
Get full text
Conference or Workshop Item -
7
An enhanced fingerprint template protection scheme
Published 2022“…Furthermore, an improved chaos-based encryption algorithm was proposed for encrypting FT. …”
Get full text
Get full text
Thesis -
8
A self-adaptive agent-based simulation modelling framework for dynamic processes
Published 2023“…Agent-based simulation (ABS) modelling had been a prevalent approach for simulation of dynamic processes of various domains. …”
text::Thesis -
9
Performance evaluation metrics for multi-objective evolutionary algorithms in search-based software engineering: systematic literature review
Published 2021“…Many recent studies have shown that various multi-objective evolutionary algorithms have been widely applied in the field of search-based software engineering (SBSE) for optimal solutions. …”
Get full text
Get full text
Article -
10
Secure lightweight client for cloud-based E-Health Model
Published 2023“…Secondly, a two-party session key protocol named password authentication key exchange based on verification elements for lightweight clients (LC-VE-PAKE) is proposed. …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
Memristor based ring oscillators true random number generator with different window functions for applications in cryptography
Published 2023“…Random or pseudorandom inputs at different terminals are also required in a lot of cryptographic protocols. For example, producing digital signatures using supporting quantities or in verification procedures that requires generating challenges. …”
Article -
13
-
14
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
15
Internet of Things-based Home Automation with Network Mapper and MQTT Protocol
Published 2025Article -
16
