Search Results - (( process certification protocol algorithm ) OR ( java application drops algorithm ))
Search alternatives:
- certification protocol »
- process certification »
- protocol algorithm »
- application drops »
- java application »
-
1
Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure
Published 2022“…These protocols have been successfully used to protect World Wide Web communication between a client and a server that has been encoded using the HTTP protocol for many years. …”
Get full text
Get full text
Get full text
Proceeding -
2
Rabin-p encryption scheme analysis on MQTT
Published 2023“…However, Rabin-p offers a lower processing algorithm. A conclusion can be made that using Rabin-p in MQTT can help improve the payload security since Rabin-p offers a complex algorithm which is it harder to decrypt the messages when communicating between devices. …”
Get full text
Get full text
Conference or Workshop Item -
3
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…In particular, the Certificate Authority is a single entity that leads to a single point of failure, while the Attribute Authority works independently. …”
Get full text
Get full text
Thesis
