Impact of MD5 Authentication in Secured and Non-Secured Traffic Routing for the Case of EIGRP, RIPv2 and OSPF Routing Protocols
Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermediate node is considered. Due to the major role that routing protocols play in computer network infrastructures, special c...
| Main Author: | Al-Saud, Khalid Ahmed Abu |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2009
|
| Subjects: | |
| Online Access: | https://etd.uum.edu.my/2056/1/Khalid_Ahmed_Abu_Al-Saud.pdf https://etd.uum.edu.my/2056/2/1.Khalid_Ahmed_Abu_Al-Saud.pdf https://etd.uum.edu.my/2056/ |
| Abstract | Abstract here |
Similar Items
An Investigation of TFRC Over MANET Routing Protocol
by: Mohamad Rizal, Abdul Rejab
Published: (2010)
by: Mohamad Rizal, Abdul Rejab
Published: (2010)
SNR Based DSDV Routing Protocol for MANET
by: Mohd Fairuz, Muhamad Fadzil
Published: (2012)
by: Mohd Fairuz, Muhamad Fadzil
Published: (2012)
A security mechanism for routing protocol of low-power and lossy networks against rank in IOT environment
by: Mah'd AlQaisi, Layla Mohammad
Published: (2025)
by: Mah'd AlQaisi, Layla Mohammad
Published: (2025)
Multifactor Authentication for Enhanced Accesss Control Security for Websites
by: Hassoun, Mohammed M.
Published: (2010)
by: Hassoun, Mohammed M.
Published: (2010)
Throughput, Smoothness Analysis of SCTP Over AODV and DSR MANET Routing Protocols
by: Lubis, Fahrurrozi
Published: (2011)
by: Lubis, Fahrurrozi
Published: (2011)
Implementing A Mobile Ad-Hoc Network Unicast Routing Protocol in NS-2
by: Mahdi, Alaa A.
Published: (2010)
by: Mahdi, Alaa A.
Published: (2010)
Comparative Study on the Performance of TCP-Freeze and TCP-Newreno Over Divert Failure Routing Protocol
by: Oudah, Atheer Yousif
Published: (2012)
by: Oudah, Atheer Yousif
Published: (2012)
Network Security Management Audit at UUM Computer Centre
by: Mohamad Fadli, Zolkipli
Published: (2004)
by: Mohamad Fadli, Zolkipli
Published: (2004)
Factors Influencing Students' Perception on Information Security Plan in UUM
by: Adebola, Babatunde Dorcas
Published: (2010)
by: Adebola, Babatunde Dorcas
Published: (2010)
The performance of directional flooding routing protocol for underwater sensor networks
by: Idrus, Nur Asfarina
Published: (2015)
by: Idrus, Nur Asfarina
Published: (2015)
VPN Solution for Zoomfinance.com : Toward Cost Saving and Security Exercise
by: Sia, Sie Tung
Published: (2003)
by: Sia, Sie Tung
Published: (2003)
Implementing Security in a Client/Server Wireless Local Area Network
by: Chong, Yin Peng
Published: (2004)
by: Chong, Yin Peng
Published: (2004)
Security Camera Real Time Recorder for Personal Property's Room Surveillance
by: Abdelrahman, Waled Abubakr
Published: (2010)
by: Abdelrahman, Waled Abubakr
Published: (2010)
A Proposed Framework for Network Security Audit Trail for Ministry of Domestic Trade & Consumer Affairs
by: Fara, Jamal
Published: (2006)
by: Fara, Jamal
Published: (2006)
Characterization of Internet Traffic in UUM Wireless Networks
by: Abdullah, Wisam Dawood
Published: (2012)
by: Abdullah, Wisam Dawood
Published: (2012)
Joint routing protocol and image compression algorithm for prolonging node lifetime in wireless sensor network
by: Ahmed Al-Doori, Ahmed Jamal
Published: (2018)
by: Ahmed Al-Doori, Ahmed Jamal
Published: (2018)
A WAP Application Requirement Model For Transmitting Traffic Offences
by: Abdalla, Ali Abdalla Muftah
Published: (2008)
by: Abdalla, Ali Abdalla Muftah
Published: (2008)
Design And Development Of A Secure Wireless System Using Frequency Hopping Spread Spectrum [TK5103.2. A148 2007 f rb].
by: Yahya, Abid
Published: (2007)
by: Yahya, Abid
Published: (2007)
Retrieving Examination Results Through Wireless Application Protocol
by: Husen, Mohd Nizam
Published: (2006)
by: Husen, Mohd Nizam
Published: (2006)
Implementation of Voice Over Internet Protocol (VoIP) in UUM Campus
by: Alden, Feras Zen
Published: (2011)
by: Alden, Feras Zen
Published: (2011)
Network Performance Evaluation Of IPv4 And IPv6 In Network Layer Protocol
by: Fatimah Zahra, W Razali
Published: (2008)
by: Fatimah Zahra, W Razali
Published: (2008)
Rate Adaptation for Avoiding Congestion in the Use of Multimedia Over User Datagram Protocol
by: Hamed, Wessam Abbas
Published: (2012)
by: Hamed, Wessam Abbas
Published: (2012)
Defending Servers Against Naptha Attack By Using An Early Client Authentication Method [TK5105.585. C518 2008 f rb].
by: Cheng, Han Pin
Published: (2008)
by: Cheng, Han Pin
Published: (2008)
Enhancement of Round Trip Time (RTT) and Packet Loss Rate (PLR) in Explicit Rate Adjust (ERA) Protocol
by: Azamuddin, Abdul Rahman
Published: (2010)
by: Azamuddin, Abdul Rahman
Published: (2010)
A new routing metric for DYMO protocol on mobile AD HOC network
by: Salleh, Noor Amani
Published: (2013)
by: Salleh, Noor Amani
Published: (2013)
Optimal forwarding routing protocol in ipv6-based wireless sensor network
by: Jamil, Ansar
Published: (2009)
by: Jamil, Ansar
Published: (2009)
Smart security system for home (IOT)
by: Abd Oun, Muhamed Obed
Published: (2020)
by: Abd Oun, Muhamed Obed
Published: (2020)
An Analysis of SCTP in Best-Effort Network With Competing Flows
by: Waleed, Elbara Khalid Ali Waleed
Published: (2011)
by: Waleed, Elbara Khalid Ali Waleed
Published: (2011)
Enhancement of network security by use machine learning
by: Hasan, Ahmed Raheem
Published: (2019)
by: Hasan, Ahmed Raheem
Published: (2019)
Security and performance enhancement of authentication protocols in heterogeneous wireless networks
by: Alezabi, Kamal Ali Ahmed
Published: (2017)
by: Alezabi, Kamal Ali Ahmed
Published: (2017)
Solving security staff scheduling by using genetic algorithm
by: Ang, Shin Yin
Published: (2021)
by: Ang, Shin Yin
Published: (2021)
Cluster head selection and secure path adaptation algorithms to enhance manet secure routing protocol
by: Khalid Hussain
Published: (2025)
by: Khalid Hussain
Published: (2025)
Internet of things security implementation using blockchain for wireless technology
by: Karim, Karim Jabur
Published: (2019)
by: Karim, Karim Jabur
Published: (2019)
Requirement Analysis for LAN Implementation in KUSZA
by: Mohd Fadzil, Abdul Kadir
Published: (2004)
by: Mohd Fadzil, Abdul Kadir
Published: (2004)
Mobile Distributed News Web Service
by: Abdul Wahab, Prasit
Published: (2005)
by: Abdul Wahab, Prasit
Published: (2005)
Modeling Wireless LAN (WI-FI) in Kolej Latihan Telekom Utara, Taiping
by: Tajudin, Ramlee
Published: (2005)
by: Tajudin, Ramlee
Published: (2005)
Evaluating Strategies for E-Commerce Sites : A Malaysian Perspective
by: Sherlin, G. Subramaniam
Published: (2003)
by: Sherlin, G. Subramaniam
Published: (2003)
Evaluating the Web Conference Prototype at FTM Building
by: Charoensri, Srisuwan
Published: (2004)
by: Charoensri, Srisuwan
Published: (2004)
Faktor-Faktor yang Memotivasikan Remaja untuk Membuat Pembelian Telefon Bimbit
by: Waida Irani, Mohd. Fauzi
Published: (2003)
by: Waida Irani, Mohd. Fauzi
Published: (2003)
University Web Site Content Benchmarking : Evaluation and Improvement
by: Yew, Been Hui
Published: (2003)
by: Yew, Been Hui
Published: (2003)
Similar Items
-
An Investigation of TFRC Over MANET Routing Protocol
by: Mohamad Rizal, Abdul Rejab
Published: (2010) -
SNR Based DSDV Routing Protocol for MANET
by: Mohd Fairuz, Muhamad Fadzil
Published: (2012) -
A security mechanism for routing protocol of low-power and lossy networks against rank in IOT environment
by: Mah'd AlQaisi, Layla Mohammad
Published: (2025) -
Multifactor Authentication for Enhanced Accesss Control Security for Websites
by: Hassoun, Mohammed M.
Published: (2010) -
Throughput, Smoothness Analysis of SCTP Over AODV and DSR MANET Routing Protocols
by: Lubis, Fahrurrozi
Published: (2011)
