A seed generation technique based on elliptic curvefor providing synchronization in secured immersive teleconferencing
Immersive Teleconferencing as one of the new progresses in video-conferencing allows users to see multiple partners in the conference simultaneously or watch a single event from different views. H.264/MVC standard provides a well-defined structure for implementing immersive teleconferencing that can...
| Auteur principal: | Khoubiar, Vahidreza |
|---|---|
| Format: | Thèse |
| Langue: | anglais |
| Publié: |
2013
|
| Sujets: | |
| Accès en ligne: | http://eprints.utm.my/36693/5/VahidrezaKhoubiarMFSKSM2013.pdf |
Documents similaires
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
par: Ismaeel, Nooruldeen Qutaiba
Publié: (2016)
par: Ismaeel, Nooruldeen Qutaiba
Publié: (2016)
Information security concerns towards best practices for IT outsourcing projects from the perspective of service provider in Iran
par: Parham, Nima
Publié: (2009)
par: Parham, Nima
Publié: (2009)
An enhanced next generation security operation center framework for information system security management
par: Yau, Ti Dun
Publié: (2023)
par: Yau, Ti Dun
Publié: (2023)
Improving the communication performance in synchronous collaborative application
par: Maganlal, Jayesh M. Patel
Publié: (2005)
par: Maganlal, Jayesh M. Patel
Publié: (2005)
New Representation Method For Integers And Its Application On Elliptic Curve Cryptography
par: Eghdamian, Arash
Publié: (2020)
par: Eghdamian, Arash
Publié: (2020)
Securing the image through the combination of elliptic curve cryptosystem and hill cipher encryption
par: Sulaiman, Saniah
Publié: (2019)
par: Sulaiman, Saniah
Publié: (2019)
Lightweight mutual authentication scheme based on elliptic curve deffie-hellman key exchange in machine-to-machine communication network
par: Ullah, Shafi
Publié: (2021)
par: Ullah, Shafi
Publié: (2021)
Process state synchronization for mobility support in mobile cloud computing / Ejaz Ahmed
par: Ejaz, Ahmed
Publié: (2016)
par: Ejaz, Ahmed
Publié: (2016)
Indexing Of Bilingual Knowledge Bank
Based On The Synchronous Sstc Structure
par: Ye , Hong Hoe
Publié: (2006)
par: Ye , Hong Hoe
Publié: (2006)
Semi-immersive virtual reality environment / Marina Ismail
par: Ismail, Marina
Publié: (2006)
par: Ismail, Marina
Publié: (2006)
Analyses of key management techniques for secure patient monitoring in wireless sensor network environment
par: Majidi, Mojib
Publié: (2010)
par: Majidi, Mojib
Publié: (2010)
Synchronization Controller To Solve
The Mismatched Sampling Rates For
Acoustic Echo Cancellation
par: Naeem, Adel Nadhem
Publié: (2015)
par: Naeem, Adel Nadhem
Publié: (2015)
Modelling semantics of security risk assessment for bring your own device using metamodelling technique
par: Md. Zain, Zamhariah
Publié: (2018)
par: Md. Zain, Zamhariah
Publié: (2018)
An enhanced test case generation technique using activity diagram for system testing
par: Yudaya, Nansukusa
Publié: (2013)
par: Yudaya, Nansukusa
Publié: (2013)
Co-creation of value between customers and providers in government e-service delivery
par: Ademola, Adeleke Imran
Publié: (2013)
par: Ademola, Adeleke Imran
Publié: (2013)
Development of Elliptic and Hyperbolic Grid Generation
par: Asmuin, Norzelawati
Publié: (2000)
par: Asmuin, Norzelawati
Publié: (2000)
The role of teleconferencing in distance education at Yayasan Pelajaran MARA / Thanapackiam d/o Periasamy
par: Periasamy, Thanapackiam
Publié: (1998)
par: Periasamy, Thanapackiam
Publié: (1998)
Security Analysis Techniques Using Differential Relationships For Block Ciphers
par: Buja, Alya Geogiana
Publié: (2018)
par: Buja, Alya Geogiana
Publié: (2018)
Eml-Mac: A Simplified Time Slot Synchronization Algorithm For
Wireless Sensor Networks
par: Yazdi, Ehsan Tabatabaei
Publié: (2010)
par: Yazdi, Ehsan Tabatabaei
Publié: (2010)
Elliptic-curve cryptographic architectures for system-on-chip based on field programmable gate arrays
par: Irwansyah, Arif
Publié: (2009)
par: Irwansyah, Arif
Publié: (2009)
Secure-Spin with hashing to support mobility and security in wireless sensor network
par: Amri, Mohammad Hossein
Publié: (2013)
par: Amri, Mohammad Hossein
Publié: (2013)
Information security compliance assessment using information security maturity model
par: Zadeh, HassanHossein
Publié: (2014)
par: Zadeh, HassanHossein
Publié: (2014)
Information security awareness framework for enhancing security privacy among twitter users
par: Saeed Hussein, Abbas Yaslam
Publié: (2017)
par: Saeed Hussein, Abbas Yaslam
Publié: (2017)
Internet browser bookmark synchronization tool / Muhd Baharul Nashim Ibrahim
par: Ibrahim, Muhd Baharul Nashim
Publié: (2007)
par: Ibrahim, Muhd Baharul Nashim
Publié: (2007)
Magnitude-based streamlines seed point selection for unsteady flow visualization
par: Yusoff, Yusman Azimi
Publié: (2020)
par: Yusoff, Yusman Azimi
Publié: (2020)
Integrating security services into active network
par: Mandala, Satria
Publié: (2005)
par: Mandala, Satria
Publié: (2005)
Mobile synchronization framework to enhance large object management in mobile cloud storage service
par: Faniband, Yunus Parvej
Publié: (2021)
par: Faniband, Yunus Parvej
Publié: (2021)
A dimension-based information security culture model for information security policy compliance behavior in Malaysian public universities
par: Akhyari, Nasir
Publié: (2019)
par: Akhyari, Nasir
Publié: (2019)
An analysis on security awareness of social networks users
par: Darvishi, Mahdi
Publié: (2013)
par: Darvishi, Mahdi
Publié: (2013)
Development of metamodel for information security risk management
par: Mohammed Ba Muqabel, Mohammed Salem
Publié: (2013)
par: Mohammed Ba Muqabel, Mohammed Salem
Publié: (2013)
Information security curriculum framework at undergraduate level
par: Sanusi Arifin, Ab. Arif
Publié: (2009)
par: Sanusi Arifin, Ab. Arif
Publié: (2009)
A network security management approach for WLAN
par: Janbeglou , Maziar
Publié: (2010)
par: Janbeglou , Maziar
Publié: (2010)
Awareness and acceptance analysis of information security policy
par: Muda, Mohd. Zuki
Publié: (2010)
par: Muda, Mohd. Zuki
Publié: (2010)
Improving information system security by evaluating human factors
par: Soltanmohammadi, Saeed
Publié: (2013)
par: Soltanmohammadi, Saeed
Publié: (2013)
Enabling security for service discovery in pervasive computing environments
par: Sharifi, Mahdi
Publié: (2009)
par: Sharifi, Mahdi
Publié: (2009)
WINPCAP : design and development of covert channel for secure communication
par: Omar, Syaril Nizam
Publié: (2007)
par: Omar, Syaril Nizam
Publié: (2007)
Detecting plaintext recovery attack in secure shell (SSH)
par: Ahmad Baidowi, Zaid Mujaiyid Putra
Publié: (2010)
par: Ahmad Baidowi, Zaid Mujaiyid Putra
Publié: (2010)
Secure hash function based on chaotic neural net works
par: Daei, Pejman
Publié: (2013)
par: Daei, Pejman
Publié: (2013)
Physical security measures framework for Marib power plant (Yemen)
par: Mohammed Al-Aghbari, Anas Mustafa
Publié: (2013)
par: Mohammed Al-Aghbari, Anas Mustafa
Publié: (2013)
Network security architecture design for Malaysian maritime enforcement agency
par: Abdul Hamid, Mahathir
Publié: (2007)
par: Abdul Hamid, Mahathir
Publié: (2007)
Documents similaires
-
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
par: Ismaeel, Nooruldeen Qutaiba
Publié: (2016) -
Information security concerns towards best practices for IT outsourcing projects from the perspective of service provider in Iran
par: Parham, Nima
Publié: (2009) -
An enhanced next generation security operation center framework for information system security management
par: Yau, Ti Dun
Publié: (2023) -
Improving the communication performance in synchronous collaborative application
par: Maganlal, Jayesh M. Patel
Publié: (2005) -
New Representation Method For Integers And Its Application On Elliptic Curve Cryptography
par: Eghdamian, Arash
Publié: (2020)