Search Results - (( exploring possible encryption algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- possible encryption »
- implication based »
- java implication »
-
1
Prototyping a lightweight encryption on a field programmable gate array for securing tele-control data
Published 2023Conference Paper -
2
Feasibility of QKD over FSO Link
Published 2012“…Due to the advancements in the field of quantum computing and possible compromise of existing key-exchange algorithms, it is essential to explore performance and efficiency of new key-exchange techniques, such as Quantum Key Distribution (QKD). …”
Get full text
Get full text
Get full text
Proceeding Paper -
3
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…The experiment showed that, for P2P identification ability, Netflow based algorithm detected 28.7% more than DPI. Further investigation clearly showed it was because DPI failed to detect encrypted P2P hosts compared to DPI. …”
Get full text
Get full text
Thesis -
4
-
5
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis
