Search Results - (( data generation protocol algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- protocol algorithm »
- java application »
- data generation »
-
1
Encryption selection for WLAN IEEE802.11G
Published 2013“…In the first scenario, the data was tested with encryption protocols and for the second scenario, the data was tested with encryption algorithms and also encryption protocols. …”
Get full text
Get full text
Thesis -
2
Octopus++: an enhanced mutual authentication security protocol and lightweight encryption and decryption algorithm based on DNA in fog computing
Published 2023“…Next, we proposed a modified security protocol based on ONDNA and hash message authentication code with secure hash algorithm 2. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Octopus++: an enhanced mutual authentication protocol with lightweight encryption and decryption algorithm based on dna in fog computing
Published 2023“…Next, we proposed a modified security protocol based on ONDNA and hash message authentication code with secure hash algorithm 2. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
-
5
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
6
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
Published 2019“…This newly developed protocol is named Secure and Energy-Efficient Data Aggregation (SEEDA), which is the extension of SDAACA protocol. …”
Get full text
Get full text
Article -
7
-
8
On the security of digital signature protocol based on iterated function systems.
Published 2011“…This new system can be expected to have at least the same computational security against some known attacks. A Diffie-Hellman algorithm is used to improve the security of the proposed protocol by generating the number of iteration that is used to find the attractor of the iterated function system, which is used to calculate the public key and the signature. …”
Get full text
Get full text
Get full text
Article -
9
A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata
Published 2019“…Secret Sharing technique is used to generate Fake Asymmetric Keys by using LaGrange Polynomial Interpolation formula and RSA algorithm. …”
Get full text
Get full text
Thesis -
10
Fine-tuning approach in metaheuristic algorithm to prolong wireless sensor networks nodes lifetime
Published 2022“…Such protocols have adopted metaheuristic algorithms to secure the efficiency of the clustering and routing protocols. …”
Get full text
Get full text
Article -
11
Joint routing protocol and image compression algorithm for prolonging node lifetime in wireless sensor network
Published 2018“…Thus the proposed algorithm prolongs the network under consideration by 57 – 62% as compared to networks with conventional routing protocols.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Handover initiation algorithm in hierarchical macrocell/femtocell In LTE network / Abdul Azim Mad Diah
Published 2013“…The fourth generation (4G) wireless technology known as Long Term Evolution (LTE) allows cellular operators to use new and wider spectrum and complements third generation (3G) networks with higher user data rates, lower latency and flat Internet Protocol (IP)-based network architecture. …”
Get full text
Get full text
Thesis -
13
-
14
An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network
Published 2016“…Therefore, this thesis presents a new authentication protocol model that utilizes Electrocardiogram (ECG) signal as biometric as well as cryptographic key to ensure that the transmitted data are originated from the required WBAN. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Synchronization algorithm for remote heterogeneous database environment
Published 2015“…To achieve this feat, three separate algorithms are generated. In addition, jQuery technology is adopted to determine the active path, and the data is transmitted via web service that operates on XML technology over HTTP protocol. …”
Get full text
Get full text
Article -
16
Blockchain based security framework for device authentication and data communication in decentralized IoT network
Published 2023“…Furthermore, the adoption of IPFS has not only boosted the accessibility of data files on the network but has also demonstrated a remarkable reduction in data sharing time, with a 27% decrease in upload times and a 23.67% decrease in download times when compared to File Transfer Protocol (FTP). …”
Get full text
Get full text
Thesis -
17
Routing protocols performance on 6LoWPAN IoT networks
Published 2025“…This result is valuable to further implement these protocols in the testbed as well as provide an idea of the algorithmic enhancements.…”
Get full text
Get full text
Get full text
Get full text
Article -
18
Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET
Published 2014“…Simulation results show that CDS generated by the enhanced marking process exhibits better data delivery rate and lower link broke count than CDS generated by the original marking process. …”
Get full text
Get full text
Get full text
Thesis -
19
Improving Network Consistency and Data Availability Using Fuzzy C Mean Clustering Algorithm in Wireless Sensor Networks
Published 2024thesis::doctoral thesis -
20
Skype multimedia application traffic analysis on home Unifi network / Siti Fatimah Ramle
Published 2017“…Collected data are analysed on total of bandwidth usage and type of protocol used. …”
Get full text
Get full text
Thesis
