Search Results - (( protocol distributed max algorithm ) OR ( java application modified algorithm ))

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks by Sadeghi, Mohammad Mehdi Gilanian

    Published 2015
    “…To generate, update and distribute the keys for secure communication over IEEE 802.16e, the MBS applies Multicast and Broadcast Rekeying Algorithm (MBRA) as a basic key management algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Security Zone and Key Derivation Management in Centralized Security Control in Wimax Multihop Relay System by Adnan, Shahid Khan, N., Fisal, N.N.M.I., Ma’arof, Fath.E.I., Khalifa, M., Abbas, Hashim, E. A. Elshafie

    Published 2010
    “…In order to operate efficiently, communication must be scheduled either by a distributed, centralized or hybrid algorithms. A WiMAX network usually operates in a highly dynamic and open environment therefore it is known to be more vulnerable to security holes. …”
    Get full text
    Get full text
    Proceeding
  3. 3

    A new model of application response time for VoIP over WLAN and fixed WiMAX by Nisar, K., Hijazi, M.H.A., Lawal, I.A.

    Published 2015
    “…In this paper we provide an overview and develops a new distributed model to improve QoS performance for VoIP over WLAN and Fixed WiMAX network with respect to Application Response Time (ART). …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  8. 8