Search Results - (( process sharing protocol algorithm ) OR ( java application using algorithm ))
Search alternatives:
- protocol algorithm »
- sharing protocol »
- java application »
- process sharing »
- using algorithm »
-
1
A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata
Published 2019“…The protocol defines the procedures which engage two layers of deniability techniques; namely Secret Sharing and Valid Fake Messages. …”
Get full text
Get full text
Thesis -
2
Encryption selection for WLAN IEEE802.11G
Published 2013“…It also showed that DES algorithm produced the best time success along with WEP encryption protocol. …”
Get full text
Get full text
Thesis -
3
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
4
Reduced latency in restricted flooding routing protocol for mobile ad hoc network.
Published 2007“…With location information of the destination node, the source node and also of the current node, RREQ will be more directed towards destination since nodes that are within the directed region will participate in the routing process. This paper presents Quadrant-based directional routing protocol (Q-DIR) algorithm that restrict the broadcast region to a quadrant where the destination node and source node are located. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
Get full text
Get full text
Student Project -
6
-
7
Implementation of Schnorr Digital Signature into Station-to-Station Protocol / Nurul Mahira Budin, Nor Hafikah Othman and Nur Izzatie Farhana Ahmad Fauzan
Published 2018“…Thus, we implement Schnorr Digital Signature into STS protocol to use Schnorr elements in completing the key exchange process. …”
Get full text
Get full text
Student Project -
8
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
9
Blockchain based security framework for device authentication and data communication in decentralized IoT network
Published 2023“…The proposed authentication protocol has reduced the time required for authentication by 12.5% compared to similar blockchain based authentication protocols. …”
Get full text
Get full text
Thesis -
10
Proactive Traffic-Adaptive Tuning of Contention Window for Wireless Sensor Network Medium-Access Control Protocol
Published 2009“…A Medium Access Control (MAC) protocol is responsible to sufficiently provide access to a shared medium. …”
Get full text
Get full text
Thesis -
11
MAC Protocol for Opportunistic Spectrum Access in Cognitive Radio System
Published 2011“…In this paper, we study MAC protocol design for OSA in Cognitive Radio (CR) ad hoc network under Partially Observable Markov Decision Process (POMDP) algorithm that maximizes achievable throughput for SUs with sufficient protection to PUs. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
HOOPOE: High performance and efficient anonymous handover authentication protocol for flying out of zone UAVs
Published 2023“…Therefore, the number of handovers may increase, and the process of sharing authentication keys between drones to new drones may be vulnerable to eavesdropping due to the wireless connectivity. …”
Get full text
Get full text
Article -
13
Key exchange for new cryptosystem analogous to LUCELG and Cramer-Shoup
Published 2013“…Key exchange or key establishment is any process in cryptography by which users are able to share or exchange a secret key. …”
Get full text
Get full text
Get full text
Article -
14
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
16
Relay suitability based routing protocol for video streaming in vehicular ad-hoc network
Published 2022“…This thesis proposed a solution technique referred to as an Enhanced Transmit Packet Coding (enhanced-TPC) and weighted division algorithm (WDA) in Relay suitability-based routing protocol (RESP) term as WDA-RESP. …”
Get full text
Get full text
Thesis -
17
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
19
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
20
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
Published 2019“…This newly developed protocol is named Secure and Energy-Efficient Data Aggregation (SEEDA), which is the extension of SDAACA protocol. …”
Get full text
Get full text
Article
