A seed generation technique based on elliptic curvefor providing synchronization in secured immersive teleconferencing
Immersive Teleconferencing as one of the new progresses in video-conferencing allows users to see multiple partners in the conference simultaneously or watch a single event from different views. H.264/MVC standard provides a well-defined structure for implementing immersive teleconferencing that can...
| 主要作者: | Khoubiar, Vahidreza |
|---|---|
| 格式: | Thesis |
| 语言: | 英语 |
| 出版: |
2013
|
| 主题: | |
| 在线阅读: | http://eprints.utm.my/36693/5/VahidrezaKhoubiarMFSKSM2013.pdf |
相似书籍
Information security concerns towards best practices for IT outsourcing projects from the perspective of service provider in Iran
由: Parham, Nima
出版: (2009)
由: Parham, Nima
出版: (2009)
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
由: Ismaeel, Nooruldeen Qutaiba
出版: (2016)
由: Ismaeel, Nooruldeen Qutaiba
出版: (2016)
An enhanced next generation security operation center framework for information system security management
由: Yau, Ti Dun
出版: (2023)
由: Yau, Ti Dun
出版: (2023)
Improving the communication performance in synchronous collaborative application
由: Maganlal, Jayesh M. Patel
出版: (2005)
由: Maganlal, Jayesh M. Patel
出版: (2005)
New Representation Method For Integers And Its Application On Elliptic Curve Cryptography
由: Eghdamian, Arash
出版: (2020)
由: Eghdamian, Arash
出版: (2020)
Lightweight mutual authentication scheme based on elliptic curve deffie-hellman key exchange in machine-to-machine communication network
由: Ullah, Shafi
出版: (2021)
由: Ullah, Shafi
出版: (2021)
Indexing Of Bilingual Knowledge Bank
Based On The Synchronous Sstc Structure
由: Ye , Hong Hoe
出版: (2006)
由: Ye , Hong Hoe
出版: (2006)
Analyses of key management techniques for secure patient monitoring in wireless sensor network environment
由: Majidi, Mojib
出版: (2010)
由: Majidi, Mojib
出版: (2010)
Synchronization Controller To Solve
The Mismatched Sampling Rates For
Acoustic Echo Cancellation
由: Naeem, Adel Nadhem
出版: (2015)
由: Naeem, Adel Nadhem
出版: (2015)
An enhanced test case generation technique using activity diagram for system testing
由: Yudaya, Nansukusa
出版: (2013)
由: Yudaya, Nansukusa
出版: (2013)
Securing the image through the combination of elliptic curve cryptosystem and hill cipher encryption
由: Sulaiman, Saniah
出版: (2019)
由: Sulaiman, Saniah
出版: (2019)
Co-creation of value between customers and providers in government e-service delivery
由: Ademola, Adeleke Imran
出版: (2013)
由: Ademola, Adeleke Imran
出版: (2013)
Modelling semantics of security risk assessment for bring your own device using metamodelling technique
由: Md. Zain, Zamhariah
出版: (2018)
由: Md. Zain, Zamhariah
出版: (2018)
Semi-immersive virtual reality environment / Marina Ismail
由: Ismail, Marina
出版: (2006)
由: Ismail, Marina
出版: (2006)
Security Analysis Techniques Using Differential Relationships For Block Ciphers
由: Buja, Alya Geogiana
出版: (2018)
由: Buja, Alya Geogiana
出版: (2018)
Eml-Mac: A Simplified Time Slot Synchronization Algorithm For
Wireless Sensor Networks
由: Yazdi, Ehsan Tabatabaei
出版: (2010)
由: Yazdi, Ehsan Tabatabaei
出版: (2010)
Secure-Spin with hashing to support mobility and security in wireless sensor network
由: Amri, Mohammad Hossein
出版: (2013)
由: Amri, Mohammad Hossein
出版: (2013)
Information security compliance assessment using information security maturity model
由: Zadeh, HassanHossein
出版: (2014)
由: Zadeh, HassanHossein
出版: (2014)
Elliptic-curve cryptographic architectures for system-on-chip based on field programmable gate arrays
由: Irwansyah, Arif
出版: (2009)
由: Irwansyah, Arif
出版: (2009)
Information security awareness framework for enhancing security privacy among twitter users
由: Saeed Hussein, Abbas Yaslam
出版: (2017)
由: Saeed Hussein, Abbas Yaslam
出版: (2017)
Internet browser bookmark synchronization tool / Muhd Baharul Nashim Ibrahim
由: Ibrahim, Muhd Baharul Nashim
出版: (2007)
由: Ibrahim, Muhd Baharul Nashim
出版: (2007)
Development of Elliptic and Hyperbolic Grid Generation
由: Asmuin, Norzelawati
出版: (2000)
由: Asmuin, Norzelawati
出版: (2000)
Magnitude-based streamlines seed point selection for unsteady flow visualization
由: Yusoff, Yusman Azimi
出版: (2020)
由: Yusoff, Yusman Azimi
出版: (2020)
Integrating security services into active network
由: Mandala, Satria
出版: (2005)
由: Mandala, Satria
出版: (2005)
A dimension-based information security culture model for information security policy compliance behavior in Malaysian public universities
由: Akhyari, Nasir
出版: (2019)
由: Akhyari, Nasir
出版: (2019)
An analysis on security awareness of social networks users
由: Darvishi, Mahdi
出版: (2013)
由: Darvishi, Mahdi
出版: (2013)
Development of metamodel for information security risk management
由: Mohammed Ba Muqabel, Mohammed Salem
出版: (2013)
由: Mohammed Ba Muqabel, Mohammed Salem
出版: (2013)
Information security curriculum framework at undergraduate level
由: Sanusi Arifin, Ab. Arif
出版: (2009)
由: Sanusi Arifin, Ab. Arif
出版: (2009)
A network security management approach for WLAN
由: Janbeglou , Maziar
出版: (2010)
由: Janbeglou , Maziar
出版: (2010)
Awareness and acceptance analysis of information security policy
由: Muda, Mohd. Zuki
出版: (2010)
由: Muda, Mohd. Zuki
出版: (2010)
Mobile synchronization framework to enhance large object management in mobile cloud storage service
由: Faniband, Yunus Parvej
出版: (2021)
由: Faniband, Yunus Parvej
出版: (2021)
Improving information system security by evaluating human factors
由: Soltanmohammadi, Saeed
出版: (2013)
由: Soltanmohammadi, Saeed
出版: (2013)
Enabling security for service discovery in pervasive computing environments
由: Sharifi, Mahdi
出版: (2009)
由: Sharifi, Mahdi
出版: (2009)
WINPCAP : design and development of covert channel for secure communication
由: Omar, Syaril Nizam
出版: (2007)
由: Omar, Syaril Nizam
出版: (2007)
Detecting plaintext recovery attack in secure shell (SSH)
由: Ahmad Baidowi, Zaid Mujaiyid Putra
出版: (2010)
由: Ahmad Baidowi, Zaid Mujaiyid Putra
出版: (2010)
Secure hash function based on chaotic neural net works
由: Daei, Pejman
出版: (2013)
由: Daei, Pejman
出版: (2013)
Physical security measures framework for Marib power plant (Yemen)
由: Mohammed Al-Aghbari, Anas Mustafa
出版: (2013)
由: Mohammed Al-Aghbari, Anas Mustafa
出版: (2013)
Network security architecture design for Malaysian maritime enforcement agency
由: Abdul Hamid, Mahathir
出版: (2007)
由: Abdul Hamid, Mahathir
出版: (2007)
Users' perception of the information security policy at Universiti Teknologi Malaysia
由: Sharif, Haniza
出版: (2009)
由: Sharif, Haniza
出版: (2009)
Educational and training model of security awareness on mobile devices for students
由: Din, Dzairol Adzriem
出版: (2012)
由: Din, Dzairol Adzriem
出版: (2012)
相似书籍
-
Information security concerns towards best practices for IT outsourcing projects from the perspective of service provider in Iran
由: Parham, Nima
出版: (2009) -
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
由: Ismaeel, Nooruldeen Qutaiba
出版: (2016) -
An enhanced next generation security operation center framework for information system security management
由: Yau, Ti Dun
出版: (2023) -
Improving the communication performance in synchronous collaborative application
由: Maganlal, Jayesh M. Patel
出版: (2005) -
New Representation Method For Integers And Its Application On Elliptic Curve Cryptography
由: Eghdamian, Arash
出版: (2020)