A seed generation technique based on elliptic curvefor providing synchronization in secured immersive teleconferencing
Immersive Teleconferencing as one of the new progresses in video-conferencing allows users to see multiple partners in the conference simultaneously or watch a single event from different views. H.264/MVC standard provides a well-defined structure for implementing immersive teleconferencing that can...
| 第一著者: | Khoubiar, Vahidreza |
|---|---|
| フォーマット: | 学位論文 |
| 言語: | 英語 |
| 出版事項: |
2013
|
| 主題: | |
| オンライン・アクセス: | http://eprints.utm.my/36693/5/VahidrezaKhoubiarMFSKSM2013.pdf |
類似資料
Information security concerns towards best practices for IT outsourcing projects from the perspective of service provider in Iran
著者:: Parham, Nima
出版事項: (2009)
著者:: Parham, Nima
出版事項: (2009)
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
著者:: Ismaeel, Nooruldeen Qutaiba
出版事項: (2016)
著者:: Ismaeel, Nooruldeen Qutaiba
出版事項: (2016)
An enhanced next generation security operation center framework for information system security management
著者:: Yau, Ti Dun
出版事項: (2023)
著者:: Yau, Ti Dun
出版事項: (2023)
Improving the communication performance in synchronous collaborative application
著者:: Maganlal, Jayesh M. Patel
出版事項: (2005)
著者:: Maganlal, Jayesh M. Patel
出版事項: (2005)
New Representation Method For Integers And Its Application On Elliptic Curve Cryptography
著者:: Eghdamian, Arash
出版事項: (2020)
著者:: Eghdamian, Arash
出版事項: (2020)
Lightweight mutual authentication scheme based on elliptic curve deffie-hellman key exchange in machine-to-machine communication network
著者:: Ullah, Shafi
出版事項: (2021)
著者:: Ullah, Shafi
出版事項: (2021)
Indexing Of Bilingual Knowledge Bank
Based On The Synchronous Sstc Structure
著者:: Ye , Hong Hoe
出版事項: (2006)
著者:: Ye , Hong Hoe
出版事項: (2006)
Analyses of key management techniques for secure patient monitoring in wireless sensor network environment
著者:: Majidi, Mojib
出版事項: (2010)
著者:: Majidi, Mojib
出版事項: (2010)
Synchronization Controller To Solve
The Mismatched Sampling Rates For
Acoustic Echo Cancellation
著者:: Naeem, Adel Nadhem
出版事項: (2015)
著者:: Naeem, Adel Nadhem
出版事項: (2015)
An enhanced test case generation technique using activity diagram for system testing
著者:: Yudaya, Nansukusa
出版事項: (2013)
著者:: Yudaya, Nansukusa
出版事項: (2013)
Securing the image through the combination of elliptic curve cryptosystem and hill cipher encryption
著者:: Sulaiman, Saniah
出版事項: (2019)
著者:: Sulaiman, Saniah
出版事項: (2019)
Co-creation of value between customers and providers in government e-service delivery
著者:: Ademola, Adeleke Imran
出版事項: (2013)
著者:: Ademola, Adeleke Imran
出版事項: (2013)
Modelling semantics of security risk assessment for bring your own device using metamodelling technique
著者:: Md. Zain, Zamhariah
出版事項: (2018)
著者:: Md. Zain, Zamhariah
出版事項: (2018)
Semi-immersive virtual reality environment / Marina Ismail
著者:: Ismail, Marina
出版事項: (2006)
著者:: Ismail, Marina
出版事項: (2006)
Security Analysis Techniques Using Differential Relationships For Block Ciphers
著者:: Buja, Alya Geogiana
出版事項: (2018)
著者:: Buja, Alya Geogiana
出版事項: (2018)
Eml-Mac: A Simplified Time Slot Synchronization Algorithm For
Wireless Sensor Networks
著者:: Yazdi, Ehsan Tabatabaei
出版事項: (2010)
著者:: Yazdi, Ehsan Tabatabaei
出版事項: (2010)
Secure-Spin with hashing to support mobility and security in wireless sensor network
著者:: Amri, Mohammad Hossein
出版事項: (2013)
著者:: Amri, Mohammad Hossein
出版事項: (2013)
Information security compliance assessment using information security maturity model
著者:: Zadeh, HassanHossein
出版事項: (2014)
著者:: Zadeh, HassanHossein
出版事項: (2014)
Elliptic-curve cryptographic architectures for system-on-chip based on field programmable gate arrays
著者:: Irwansyah, Arif
出版事項: (2009)
著者:: Irwansyah, Arif
出版事項: (2009)
Information security awareness framework for enhancing security privacy among twitter users
著者:: Saeed Hussein, Abbas Yaslam
出版事項: (2017)
著者:: Saeed Hussein, Abbas Yaslam
出版事項: (2017)
Internet browser bookmark synchronization tool / Muhd Baharul Nashim Ibrahim
著者:: Ibrahim, Muhd Baharul Nashim
出版事項: (2007)
著者:: Ibrahim, Muhd Baharul Nashim
出版事項: (2007)
Development of Elliptic and Hyperbolic Grid Generation
著者:: Asmuin, Norzelawati
出版事項: (2000)
著者:: Asmuin, Norzelawati
出版事項: (2000)
Magnitude-based streamlines seed point selection for unsteady flow visualization
著者:: Yusoff, Yusman Azimi
出版事項: (2020)
著者:: Yusoff, Yusman Azimi
出版事項: (2020)
Integrating security services into active network
著者:: Mandala, Satria
出版事項: (2005)
著者:: Mandala, Satria
出版事項: (2005)
A dimension-based information security culture model for information security policy compliance behavior in Malaysian public universities
著者:: Akhyari, Nasir
出版事項: (2019)
著者:: Akhyari, Nasir
出版事項: (2019)
An analysis on security awareness of social networks users
著者:: Darvishi, Mahdi
出版事項: (2013)
著者:: Darvishi, Mahdi
出版事項: (2013)
Development of metamodel for information security risk management
著者:: Mohammed Ba Muqabel, Mohammed Salem
出版事項: (2013)
著者:: Mohammed Ba Muqabel, Mohammed Salem
出版事項: (2013)
Information security curriculum framework at undergraduate level
著者:: Sanusi Arifin, Ab. Arif
出版事項: (2009)
著者:: Sanusi Arifin, Ab. Arif
出版事項: (2009)
A network security management approach for WLAN
著者:: Janbeglou , Maziar
出版事項: (2010)
著者:: Janbeglou , Maziar
出版事項: (2010)
Awareness and acceptance analysis of information security policy
著者:: Muda, Mohd. Zuki
出版事項: (2010)
著者:: Muda, Mohd. Zuki
出版事項: (2010)
Mobile synchronization framework to enhance large object management in mobile cloud storage service
著者:: Faniband, Yunus Parvej
出版事項: (2021)
著者:: Faniband, Yunus Parvej
出版事項: (2021)
Improving information system security by evaluating human factors
著者:: Soltanmohammadi, Saeed
出版事項: (2013)
著者:: Soltanmohammadi, Saeed
出版事項: (2013)
Enabling security for service discovery in pervasive computing environments
著者:: Sharifi, Mahdi
出版事項: (2009)
著者:: Sharifi, Mahdi
出版事項: (2009)
WINPCAP : design and development of covert channel for secure communication
著者:: Omar, Syaril Nizam
出版事項: (2007)
著者:: Omar, Syaril Nizam
出版事項: (2007)
Detecting plaintext recovery attack in secure shell (SSH)
著者:: Ahmad Baidowi, Zaid Mujaiyid Putra
出版事項: (2010)
著者:: Ahmad Baidowi, Zaid Mujaiyid Putra
出版事項: (2010)
Secure hash function based on chaotic neural net works
著者:: Daei, Pejman
出版事項: (2013)
著者:: Daei, Pejman
出版事項: (2013)
Physical security measures framework for Marib power plant (Yemen)
著者:: Mohammed Al-Aghbari, Anas Mustafa
出版事項: (2013)
著者:: Mohammed Al-Aghbari, Anas Mustafa
出版事項: (2013)
Network security architecture design for Malaysian maritime enforcement agency
著者:: Abdul Hamid, Mahathir
出版事項: (2007)
著者:: Abdul Hamid, Mahathir
出版事項: (2007)
Users' perception of the information security policy at Universiti Teknologi Malaysia
著者:: Sharif, Haniza
出版事項: (2009)
著者:: Sharif, Haniza
出版事項: (2009)
Educational and training model of security awareness on mobile devices for students
著者:: Din, Dzairol Adzriem
出版事項: (2012)
著者:: Din, Dzairol Adzriem
出版事項: (2012)
類似資料
-
Information security concerns towards best practices for IT outsourcing projects from the perspective of service provider in Iran
著者:: Parham, Nima
出版事項: (2009) -
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
著者:: Ismaeel, Nooruldeen Qutaiba
出版事項: (2016) -
An enhanced next generation security operation center framework for information system security management
著者:: Yau, Ti Dun
出版事項: (2023) -
Improving the communication performance in synchronous collaborative application
著者:: Maganlal, Jayesh M. Patel
出版事項: (2005) -
New Representation Method For Integers And Its Application On Elliptic Curve Cryptography
著者:: Eghdamian, Arash
出版事項: (2020)