Impact of MD5 Authentication in Secured and Non-Secured Traffic Routing for the Case of EIGRP, RIPv2 and OSPF Routing Protocols
Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermediate node is considered. Due to the major role that routing protocols play in computer network infrastructures, special c...
| Main Author: | Al-Saud, Khalid Ahmed Abu |
|---|---|
| Format: | Dissertation |
| Language: | English English |
| Published: |
2009
|
| Subjects: | |
| Online Access: | https://etd.uum.edu.my/2056/1/Khalid_Ahmed_Abu_Al-Saud.pdf https://etd.uum.edu.my/2056/2/1.Khalid_Ahmed_Abu_Al-Saud.pdf https://etd.uum.edu.my/2056/ |
| Abstract | Abstract here |
Similar Items
An Investigation of TFRC Over MANET Routing Protocol
by: Mohamad Rizal, Abdul Rejab
Published: (2010)
by: Mohamad Rizal, Abdul Rejab
Published: (2010)
SNR Based DSDV Routing Protocol for MANET
by: Mohd Fairuz, Muhamad Fadzil
Published: (2012)
by: Mohd Fairuz, Muhamad Fadzil
Published: (2012)
A security mechanism for routing protocol of low-power and lossy networks against rank in IOT environment
by: AlQaisi, Layla Mohammad Mah'd
Published: (2025)
by: AlQaisi, Layla Mohammad Mah'd
Published: (2025)
Multifactor Authentication for Enhanced Accesss Control Security for Websites
by: Hassoun, Mohammed M.
Published: (2010)
by: Hassoun, Mohammed M.
Published: (2010)
Throughput, Smoothness Analysis of SCTP Over AODV and DSR MANET Routing Protocols
by: Lubis, Fahrurrozi
Published: (2011)
by: Lubis, Fahrurrozi
Published: (2011)
Implementing A Mobile Ad-Hoc Network Unicast Routing Protocol in NS-2
by: Mahdi, Alaa A.
Published: (2010)
by: Mahdi, Alaa A.
Published: (2010)
Comparative Study on the Performance of TCP-Freeze and TCP-Newreno Over Divert Failure Routing Protocol
by: Oudah, Atheer Yousif
Published: (2012)
by: Oudah, Atheer Yousif
Published: (2012)
Network Security Management Audit at UUM Computer Centre
by: Mohamad Fadli, Zolkipli
Published: (2004)
by: Mohamad Fadli, Zolkipli
Published: (2004)
Factors Influencing Students' Perception on Information Security Plan in UUM
by: Adebola, Babatunde Dorcas
Published: (2010)
by: Adebola, Babatunde Dorcas
Published: (2010)
The performance of directional flooding routing protocol for underwater sensor networks
by: Idrus, Nur Asfarina
Published: (2015)
by: Idrus, Nur Asfarina
Published: (2015)
Security Camera Real Time Recorder for Personal Property's Room Surveillance
by: Abdelrahman, Waled Abubakr
Published: (2010)
by: Abdelrahman, Waled Abubakr
Published: (2010)
VPN Solution for Zoomfinance.com : Toward Cost Saving and Security Exercise
by: Sia, Sie Tung
Published: (2003)
by: Sia, Sie Tung
Published: (2003)
Implementing Security in a Client/Server Wireless Local Area Network
by: Chong, Yin Peng
Published: (2004)
by: Chong, Yin Peng
Published: (2004)
A Proposed Framework for Network Security Audit Trail for Ministry of Domestic Trade & Consumer Affairs
by: Fara, Jamal
Published: (2006)
by: Fara, Jamal
Published: (2006)
Characterization of Internet Traffic in UUM Wireless Networks
by: Abdullah, Wisam Dawood
Published: (2012)
by: Abdullah, Wisam Dawood
Published: (2012)
A WAP Application Requirement Model For Transmitting Traffic Offences
by: Abdalla, Ali Abdalla Muftah
Published: (2008)
by: Abdalla, Ali Abdalla Muftah
Published: (2008)
Joint routing protocol and image compression algorithm for prolonging node lifetime in wireless sensor network
by: Ahmed Al-Doori, Ahmed Jamal
Published: (2018)
by: Ahmed Al-Doori, Ahmed Jamal
Published: (2018)
Design And Development Of A Secure Wireless System Using Frequency Hopping Spread Spectrum [TK5103.2. A148 2007 f rb].
by: Yahya, Abid
Published: (2007)
by: Yahya, Abid
Published: (2007)
Retrieving Examination Results Through Wireless Application Protocol
by: Husen, Mohd Nizam
Published: (2006)
by: Husen, Mohd Nizam
Published: (2006)
Implementation of Voice Over Internet Protocol (VoIP) in UUM Campus
by: Alden, Feras Zen
Published: (2011)
by: Alden, Feras Zen
Published: (2011)
Rate Adaptation for Avoiding Congestion in the Use of Multimedia Over User Datagram Protocol
by: Hamed, Wessam Abbas
Published: (2012)
by: Hamed, Wessam Abbas
Published: (2012)
Network Performance Evaluation Of IPv4 And IPv6 In Network Layer Protocol
by: Fatimah Zahra, W Razali
Published: (2008)
by: Fatimah Zahra, W Razali
Published: (2008)
Defending Servers Against Naptha Attack By Using An Early Client Authentication Method [TK5105.585. C518 2008 f rb].
by: Cheng, Han Pin
Published: (2008)
by: Cheng, Han Pin
Published: (2008)
Enhancement of Round Trip Time (RTT) and Packet Loss Rate (PLR) in Explicit Rate Adjust (ERA) Protocol
by: Azamuddin, Abdul Rahman
Published: (2010)
by: Azamuddin, Abdul Rahman
Published: (2010)
Optimal forwarding routing protocol in ipv6-based wireless sensor network
by: Jamil, Ansar
Published: (2009)
by: Jamil, Ansar
Published: (2009)
A new routing metric for DYMO protocol on mobile AD HOC network
by: Salleh, Noor Amani
Published: (2013)
by: Salleh, Noor Amani
Published: (2013)
An Analysis of SCTP in Best-Effort Network With Competing Flows
by: Waleed, Elbara Khalid Ali Waleed
Published: (2011)
by: Waleed, Elbara Khalid Ali Waleed
Published: (2011)
Smart security system for home (IOT)
by: Abd Oun, Muhamed Obed
Published: (2020)
by: Abd Oun, Muhamed Obed
Published: (2020)
Enhancement of network security by use machine learning
by: Hasan, Ahmed Raheem
Published: (2019)
by: Hasan, Ahmed Raheem
Published: (2019)
Solving security staff scheduling by using genetic algorithm
by: Ang, Shin Yin
Published: (2021)
by: Ang, Shin Yin
Published: (2021)
Internet of things security implementation using blockchain for wireless technology
by: Karim, Karim Jabur
Published: (2019)
by: Karim, Karim Jabur
Published: (2019)
Security and performance enhancement of authentication protocols in heterogeneous wireless networks
by: Alezabi, Kamal Ali Ahmed
Published: (2017)
by: Alezabi, Kamal Ali Ahmed
Published: (2017)
Cluster head selection and secure path adaptation algorithms to enhance manet secure routing protocol
by: Khalid Hussain
Published: (2025)
by: Khalid Hussain
Published: (2025)
A Real Time Distributed Network Monitoring Platform (RTDNM)
by: Manasrah, Ahmed Mansour Mohammed
Published: (2009)
by: Manasrah, Ahmed Mansour Mohammed
Published: (2009)
Rohc-Mpls Tunnel Architecture For Wireless Mesh
by: Sarwar, Muhammad Imran
Published: (2018)
by: Sarwar, Muhammad Imran
Published: (2018)
Dynamic Images Carousel Transmissions Over Multiple Multicast Groups [TK5105.2. S959 2004 f rb] [Microfiche 7962].
by: Ratsameemonthol, Supakorn
Published: (2004)
by: Ratsameemonthol, Supakorn
Published: (2004)
Rekabentuk Dan Perlaksanaan Terminal Voip [TK5105.8865 A836 2004 f rb] [Microfiche 7998].
by: Romli, Muhamad Asmi
Published: (2004)
by: Romli, Muhamad Asmi
Published: (2004)
Pemodelan Dan Analisis Rangkaian Kawasan Setempat Pelbagai Saluran Optikal [TK5105.8.I44 A995 2007 f rb].
by: Abdul Halim, Aznor Hanah
Published: (2007)
by: Abdul Halim, Aznor Hanah
Published: (2007)
Implementing Wavelength Division Multiplexing For High Speed FDDI Network.[TK5105.7. M952 2002 f rb][Microfiche 6935]
by: Mustafa Al Jada, Muhsen Abdl Mughni
Published: (2002)
by: Mustafa Al Jada, Muhsen Abdl Mughni
Published: (2002)
Implikasi Pengaplikasian Telecommuting Terhadap Pensyarah-Pelajar (Pendapat Dan Penerimaan)
by: Mohamad, Diana
Published: (2006)
by: Mohamad, Diana
Published: (2006)
Similar Items
-
An Investigation of TFRC Over MANET Routing Protocol
by: Mohamad Rizal, Abdul Rejab
Published: (2010) -
SNR Based DSDV Routing Protocol for MANET
by: Mohd Fairuz, Muhamad Fadzil
Published: (2012) -
A security mechanism for routing protocol of low-power and lossy networks against rank in IOT environment
by: AlQaisi, Layla Mohammad Mah'd
Published: (2025) -
Multifactor Authentication for Enhanced Accesss Control Security for Websites
by: Hassoun, Mohammed M.
Published: (2010) -
Throughput, Smoothness Analysis of SCTP Over AODV and DSR MANET Routing Protocols
by: Lubis, Fahrurrozi
Published: (2011)
