Search Results - (( data (processing OR proceeding) protocol algorithm ) OR ( java application using algorithm ))
Search alternatives:
- protocol algorithm »
- java application »
- using algorithm »
-
1
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
2
Encryption selection for WLAN IEEE802.11G
Published 2013“…In the first scenario, the data was tested with encryption protocols and for the second scenario, the data was tested with encryption algorithms and also encryption protocols. …”
Get full text
Get full text
Thesis -
3
-
4
Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure
Published 2022“…—The Transport Layer ensures that data is sent transparently between end-users while also enabling reliable data transfer services to the higher levels. …”
Get full text
Get full text
Get full text
Proceeding -
5
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
6
-
7
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…These algorithms are being used as encryption algorithm in Encapsulated Security Payload (ESP) protocol. …”
Get full text
Get full text
Conference or Workshop Item -
8
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
9
-
10
Energy-efficient scalable routing protocol based on ACO for WSNS
Published 2019Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks
Published 2019“…Connectivity is a critical issue in WSNs, as the data collected needs to be sent to the base station or the processing centers. …”
Get full text
Get full text
Thesis -
12
Best pulse selection of photoplethysmography signal through comparative method
Published 2012Get full text
Working Paper -
13
Development of wireless data acquisiton system using LoRa technology for construction of PID control system
Published 2025text::Thesis -
14
Prolonging lifetime of wireless sensor networks with mobile base station using particle swarm optimization
Published 2011Get full text
Working Paper -
15
Secure Hybrid Scheme For Securing Mqtt Protocol Based On Enhanced Symmetric Algorithm
Published 2023“…Internet of Things (IoT) enables device and machine communication using TCP/IP protocol. Message Queuing Telemetry Transport (MQTT) is the most preferred protocol and is expected to be the de facto messaging IoT standard. …”
Get full text
Get full text
Thesis -
16
Octopus++: an enhanced mutual authentication security protocol and lightweight encryption and decryption algorithm based on DNA in fog computing
Published 2023“…Fog computing, closer to the IoT, is formulated in data processing, filtering, aggregating, and storing. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Octopus++: an enhanced mutual authentication protocol with lightweight encryption and decryption algorithm based on dna in fog computing
Published 2023“…Fog computing, closer to the IoT, is formulated in data processing, filtering, aggregating, and storing. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Differential evolution optimization for constrained routing in Wireless Mesh Networks
Published 2014“…Simulation on NS2 proves its performance advantages over AODV protocol.…”
Get full text
Get full text
Get full text
Proceeding Paper -
19
-
20
Performance enhancement of adaptive cluster formation and routing protocols in wireless networks
Published 2017“…EBCRA solves the issue of redundant re-transmission of RREQ packet and propose a routing algorithm that deal with the broadcast storm problem which is widely practiced in MANET routing protocol. …”
Get full text
Get full text
Get full text
Thesis
