Search Results - (( protocol distributed max algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 5 results of 5
Refine Results
  1. 1

    Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks by Sadeghi, Mohammad Mehdi Gilanian

    Published 2015
    “…To generate, update and distribute the keys for secure communication over IEEE 802.16e, the MBS applies Multicast and Broadcast Rekeying Algorithm (MBRA) as a basic key management algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Security Zone and Key Derivation Management in Centralized Security Control in Wimax Multihop Relay System by Adnan, Shahid Khan, N., Fisal, N.N.M.I., Ma’arof, Fath.E.I., Khalifa, M., Abbas, Hashim, E. A. Elshafie

    Published 2010
    “…In order to operate efficiently, communication must be scheduled either by a distributed, centralized or hybrid algorithms. A WiMAX network usually operates in a highly dynamic and open environment therefore it is known to be more vulnerable to security holes. …”
    Get full text
    Get full text
    Proceeding
  3. 3

    A new model of application response time for VoIP over WLAN and fixed WiMAX by Nisar, K., Hijazi, M.H.A., Lawal, I.A.

    Published 2015
    “…In this paper we provide an overview and develops a new distributed model to improve QoS performance for VoIP over WLAN and Fixed WiMAX network with respect to Application Response Time (ART). …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item