Search Results - (( identification implementation encryption algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- identification implementation »
- implementation encryption »
- implication based »
- java implication »
-
1
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…However, this approach has its setbacks which are (i) Traffic Bottleneck (ii) Extensive Resources and (iii) Encrypted Payload. The purpose of this dissertation was to implement OSI Transport Layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall. …”
Get full text
Get full text
Thesis -
2
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. …”
Get full text
Get full text
Get full text
Thesis -
3
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
Get full text
Get full text
Thesis -
4
-
5
Systematic literature review: Trend analysis on the design of lightweight block cipher
Published 2024journal::journal article -
6
Fractal coding of bio-metric image for face authentication
Published 2021Get full text
Get full text
Thesis -
7
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis
