Search Results - (( data (processing OR proceeding) protocol algorithm ) OR ( java application based algorithm ))

Refine Results
  1. 1

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…This paper proposes an efficient approach to improve Rivest Shamir Adleman (RSA) algorithm using parallel technique. RSA public-key cryptosystem has been the most popular and interesting security technique for majority of applications such as internet protocols, secure internet acces and electronic commerce. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Encryption selection for WLAN IEEE802.11G by Ahmad, Zahrol Azam

    Published 2013
    “…In the first scenario, the data was tested with encryption protocols and for the second scenario, the data was tested with encryption algorithms and also encryption protocols. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure by Nayeem Ahmad, Khan, Adnan Shahid, Khan, Seleviawati, Tarmizi, Azlina, Ahmadi Julaihi, Zeeshan, Ahmad

    Published 2022
    “…—The Transport Layer ensures that data is sent transparently between end-users while also enabling reliable data transfer services to the higher levels. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  5. 5

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  6. 6
  7. 7
  8. 8
  9. 9

    Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks by Alhalabi, Huda A. H.

    Published 2019
    “…Connectivity is a critical issue in WSNs, as the data collected needs to be sent to the base station or the processing centers. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12
  13. 13

    Secure Hybrid Scheme For Securing Mqtt Protocol Based On Enhanced Symmetric Algorithm by Hintaw, Ahmed Jameel

    Published 2023
    “…Internet of Things (IoT) enables device and machine communication using TCP/IP protocol. Message Queuing Telemetry Transport (MQTT) is the most preferred protocol and is expected to be the de facto messaging IoT standard. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    Performance enhancement of adaptive cluster formation and routing protocols in wireless networks by Khalaf, Osamah Ibrahem

    Published 2017
    “…EBCRA solves the issue of redundant re-transmission of RREQ packet and propose a routing algorithm that deal with the broadcast storm problem which is widely practiced in MANET routing protocol. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20