Search Results - (( data generation protocol algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Encryption selection for WLAN IEEE802.11G by Ahmad, Zahrol Azam

    Published 2013
    “…In the first scenario, the data was tested with encryption protocols and for the second scenario, the data was tested with encryption algorithms and also encryption protocols. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Octopus++: an enhanced mutual authentication security protocol and lightweight encryption and decryption algorithm based on DNA in fog computing by Rahman, Gohar

    Published 2023
    “…Next, we proposed a modified security protocol based on ONDNA and hash message authentication code with secure hash algorithm 2. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Octopus++: an enhanced mutual authentication protocol with lightweight encryption and decryption algorithm based on dna in fog computing by Rahman, Gohar

    Published 2023
    “…Next, we proposed a modified security protocol based on ONDNA and hash message authentication code with secure hash algorithm 2. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  6. 6

    Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model by Jasim, Ahmed Abdulhadi, Idris, Mohd Yamani Idna, Azzuhri, Saaidal Razalli, Issa, Noor Riyadh, Noor, Noorzaily Mohamed, Kakarla, Jagadeesh, Amiri, Iraj Sadegh

    Published 2019
    “…This newly developed protocol is named Secure and Energy-Efficient Data Aggregation (SEEDA), which is the extension of SDAACA protocol. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    On the security of digital signature protocol based on iterated function systems. by M. G. AL-Saidi, Nadia, Md. Said, Mohamad Rushdan

    Published 2011
    “…This new system can be expected to have at least the same computational security against some known attacks. A Diffie-Hellman algorithm is used to improve the security of the proposed protocol by generating the number of iteration that is used to find the attractor of the iterated function system, which is used to calculate the public key and the signature. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata by Mohamad Hata, Mohsen

    Published 2019
    “…Secret Sharing technique is used to generate Fake Asymmetric Keys by using LaGrange Polynomial Interpolation formula and RSA algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Fine-tuning approach in metaheuristic algorithm to prolong wireless sensor networks nodes lifetime by Rahiman, Amir Rizaan, Williams, Temitope Betty, Zakaria, Muhammad D.

    Published 2022
    “…Such protocols have adopted metaheuristic algorithms to secure the efficiency of the clustering and routing protocols. …”
    Get full text
    Get full text
    Article
  11. 11

    Joint routing protocol and image compression algorithm for prolonging node lifetime in wireless sensor network by Ahmed Al-Doori, Ahmed Jamal

    Published 2018
    “…Thus the proposed algorithm prolongs the network under consideration by 57 – 62% as compared to networks with conventional routing protocols.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Handover initiation algorithm in hierarchical macrocell/femtocell In LTE network / Abdul Azim Mad Diah by Mad Diah, Abdul Azim

    Published 2013
    “…The fourth generation (4G) wireless technology known as Long Term Evolution (LTE) allows cellular operators to use new and wider spectrum and complements third generation (3G) networks with higher user data rates, lower latency and flat Internet Protocol (IP)-based network architecture. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network by Ramli, Sofia Najwa

    Published 2016
    “…Therefore, this thesis presents a new authentication protocol model that utilizes Electrocardiogram (ECG) signal as biometric as well as cryptographic key to ensure that the transmitted data are originated from the required WBAN. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Synchronization algorithm for remote heterogeneous database environment by Imam, A.A., Basri, S.B., Ahmad, R.B.

    Published 2015
    “…To achieve this feat, three separate algorithms are generated. In addition, jQuery technology is adopted to determine the active path, and the data is transmitted via web service that operates on XML technology over HTTP protocol. …”
    Get full text
    Get full text
    Article
  16. 16

    Blockchain based security framework for device authentication and data communication in decentralized IoT network by Alahmed, Mahmoud Tayseer

    Published 2023
    “…Furthermore, the adoption of IPFS has not only boosted the accessibility of data files on the network but has also demonstrated a remarkable reduction in data sharing time, with a 27% decrease in upload times and a 23.67% decrease in download times when compared to File Transfer Protocol (FTP). …”
    Get full text
    Get full text
    Thesis
  17. 17

    Routing protocols performance on 6LoWPAN IoT networks by Abdul Razak, Siti Fatimah, Pei, Siang Chia, Kamis, Noor Hisham, Yogarayan, Sumendra, S. M. M Yassin, S. M. Warusia Mohamed, Abdollah, Mohd Faizal

    Published 2025
    “…This result is valuable to further implement these protocols in the testbed as well as provide an idea of the algorithmic enhancements.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET by Waheed, Bassam M.S.

    Published 2014
    “…Simulation results show that CDS generated by the enhanced marking process exhibits better data delivery rate and lower link broke count than CDS generated by the original marking process. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Skype multimedia application traffic analysis on home Unifi network / Siti Fatimah Ramle by Ramle, Siti Fatimah

    Published 2017
    “…Collected data are analysed on total of bandwidth usage and type of protocol used. …”
    Get full text
    Get full text
    Thesis