Search Results - (( process sharing protocol algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- protocol algorithm »
- testing algorithm »
- sharing protocol »
- java application »
- process sharing »
-
1
A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata
Published 2019“…The protocol defines the procedures which engage two layers of deniability techniques; namely Secret Sharing and Valid Fake Messages. …”
Get full text
Get full text
Thesis -
2
Encryption selection for WLAN IEEE802.11G
Published 2013“…It also showed that DES algorithm produced the best time success along with WEP encryption protocol. …”
Get full text
Get full text
Thesis -
3
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
4
Reduced latency in restricted flooding routing protocol for mobile ad hoc network.
Published 2007“…With location information of the destination node, the source node and also of the current node, RREQ will be more directed towards destination since nodes that are within the directed region will participate in the routing process. This paper presents Quadrant-based directional routing protocol (Q-DIR) algorithm that restrict the broadcast region to a quadrant where the destination node and source node are located. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
Get full text
Get full text
Student Project -
6
Implementation of Schnorr Digital Signature into Station-to-Station Protocol / Nurul Mahira Budin, Nor Hafikah Othman and Nur Izzatie Farhana Ahmad Fauzan
Published 2018“…Thus, we implement Schnorr Digital Signature into STS protocol to use Schnorr elements in completing the key exchange process. …”
Get full text
Get full text
Student Project -
7
Blockchain based security framework for device authentication and data communication in decentralized IoT network
Published 2023“…The proposed authentication protocol has reduced the time required for authentication by 12.5% compared to similar blockchain based authentication protocols. …”
Get full text
Get full text
Thesis -
8
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
9
Proactive Traffic-Adaptive Tuning of Contention Window for Wireless Sensor Network Medium-Access Control Protocol
Published 2009“…A Medium Access Control (MAC) protocol is responsible to sufficiently provide access to a shared medium. …”
Get full text
Get full text
Thesis -
10
MAC Protocol for Opportunistic Spectrum Access in Cognitive Radio System
Published 2011“…In this paper, we study MAC protocol design for OSA in Cognitive Radio (CR) ad hoc network under Partially Observable Markov Decision Process (POMDP) algorithm that maximizes achievable throughput for SUs with sufficient protection to PUs. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
HOOPOE: High performance and efficient anonymous handover authentication protocol for flying out of zone UAVs
Published 2023“…Therefore, the number of handovers may increase, and the process of sharing authentication keys between drones to new drones may be vulnerable to eavesdropping due to the wireless connectivity. …”
Get full text
Get full text
Article -
12
Key exchange for new cryptosystem analogous to LUCELG and Cramer-Shoup
Published 2013“…Key exchange or key establishment is any process in cryptography by which users are able to share or exchange a secret key. …”
Get full text
Get full text
Get full text
Article -
13
Relay suitability based routing protocol for video streaming in vehicular ad-hoc network
Published 2022“…This thesis proposed a solution technique referred to as an Enhanced Transmit Packet Coding (enhanced-TPC) and weighted division algorithm (WDA) in Relay suitability-based routing protocol (RESP) term as WDA-RESP. …”
Get full text
Get full text
Thesis -
14
-
15
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
16
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
Published 2019“…This newly developed protocol is named Secure and Energy-Efficient Data Aggregation (SEEDA), which is the extension of SDAACA protocol. …”
Get full text
Get full text
Article -
17
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
18
-
19
-
20
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project
