Search Results - (( program during protocol algorithm ) OR ( java application stemming algorithm ))

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
    Get full text
    Get full text
    Student Project
  2. 2

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…After embedding the presented solution, a new protocol is created and applied. Thus, the new protocol is available to the communicating packets across all computer networks. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5
  6. 6

    Asynchronous point to point FSK- FM radio telemetry system with data encryption for monitoring environmental conditions / Shuhaimi Shamsuddin by Shamsuddin, Shuhaimi

    Published 2003
    “…The data collected at RTS site are encrypted prior to transmission to the BTS by employing the One Time Pad (OTP) and Caesar Cipher algorithms. Serial asynchronous transmission was used as data communication protocol via RS232 port. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Obfuscatable aggregatable signcryption scheme with PadSteg for unattended devices in IoT systems by Uwadiegwu, Inyama Victor

    Published 2019
    “…The simulation result on different nodes showed that the proposed algorithm on Signcryption Obfuscatable and Steganography-PadSteg (SOS) performs 25% reasonably well as expected. …”
    Get full text
    Get full text
    Thesis