Search Results - (( exploring possible encryption algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 5 results of 5
Refine Results
  1. 1
  2. 2

    Feasibility of QKD over FSO Link by Husagić-Selman, Alma, Al-Khateeb, Wajdi Fawzi Mohammed, Saharudin, Shuhairi

    Published 2012
    “…Due to the advancements in the field of quantum computing and possible compromise of existing key-exchange algorithms, it is essential to explore performance and efficiency of new key-exchange techniques, such as Quantum Key Distribution (QKD). …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin by Amiruddin, Amir Herman

    Published 2014
    “…The experiment showed that, for P2P identification ability, Netflow based algorithm detected 28.7% more than DPI. Further investigation clearly showed it was because DPI failed to detect encrypted P2P hosts compared to DPI. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5