JXME Security: Encryption Overhead In End-To-End J2ME-JXTA Systems
This thesis aims to study file transfer speed when JXME encryption feature is applied in both asymmetric as well as password based or symmetric encryption settings.
| Main Author: | Mazlan, Rima |
|---|---|
| Format: | Thesis |
| Published: |
2008
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/1629/ |
Similar Items
AES encryption of resource allocation for ultra-reliable and enhanced mobile broadband IoT applications in fog network
by: Ahmed Alqourabah, Eissa Abdulsalam
Published: (2022)
by: Ahmed Alqourabah, Eissa Abdulsalam
Published: (2022)
Internet Security In China
by: Jia, Xu
Published: (2005)
by: Jia, Xu
Published: (2005)
Key Management For Multicast Security
by: Daw, Win Aye
Published: (2005)
by: Daw, Win Aye
Published: (2005)
Learning Environment For PDA Security
by: Velu , Vengadeshwaran
Published: (2002)
by: Velu , Vengadeshwaran
Published: (2002)
Smart home security access system using field programmable gate arrays
by: Saleh, Shukur, et al.
Published: (2018)
by: Saleh, Shukur, et al.
Published: (2018)
Smart security system for home (IOT)
by: Abd Oun, Muhamed Obed
Published: (2020)
by: Abd Oun, Muhamed Obed
Published: (2020)
Enhancement of network security by use machine learning
by: Hasan, Ahmed Raheem
Published: (2019)
by: Hasan, Ahmed Raheem
Published: (2019)
Solving security staff scheduling by using genetic algorithm
by: Ang, Shin Yin
Published: (2021)
by: Ang, Shin Yin
Published: (2021)
Web Link Classification And Aceessibillity Modelling For Web Security Enhancement
by: Chong, Chee Way
Published: (1999)
by: Chong, Chee Way
Published: (1999)
Web Link Classification And Aceessibillity Modelling For Web Security Enhancement
by: Chong, Chee Way
Published: (1999)
by: Chong, Chee Way
Published: (1999)
Web transcript verification using check digit as secure number
by: Abd Halim, Muhamad Rais, et al.
Published: (2017)
by: Abd Halim, Muhamad Rais, et al.
Published: (2017)
Internet of things security implementation using blockchain for wireless technology
by: Karim, Karim Jabur
Published: (2019)
by: Karim, Karim Jabur
Published: (2019)
E-store management using bell-lapadula access control security model
by: Roslan, Saidah Nafisah, et al.
Published: (2018)
by: Roslan, Saidah Nafisah, et al.
Published: (2018)
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancingm Efficiency and Security of VANET
by: JUBAIR, MOHAMMED AHMED, et al.
Published: (2022)
by: JUBAIR, MOHAMMED AHMED, et al.
Published: (2022)
Effect of 3 key factors on average end to end delay and jitter in MANET
by: Hakak, Saqib Iqbal, et al.
Published: (2014)
by: Hakak, Saqib Iqbal, et al.
Published: (2014)
An adaptive End-to-End QoS Management for
multimedia applications over wireless ATM network
by: F., Prihandoko, et al.
Published: (2000)
by: F., Prihandoko, et al.
Published: (2000)
Wireless physical layer security using encryption and channel pre-compensation
by: Tahir, Mohammad, et al.
Published: (2010)
by: Tahir, Mohammad, et al.
Published: (2010)
Internet of things (IoT); security requirements, attacks and counter measures
by: Imdad, Maria, et al.
Published: (2020)
by: Imdad, Maria, et al.
Published: (2020)
Adaptive MIMO-OFDM combining space-time block codes and spatial multiplexing in correlated frequency-selective channels
by: Halmi, Mohd Hairi
Published: (2005)
by: Halmi, Mohd Hairi
Published: (2005)
Providing Quality Of Service In IEEE 802.11 Wireless Local Area Network (WLAN)
by: Ng, Bryan Cheng Kuan
Published: (2005)
by: Ng, Bryan Cheng Kuan
Published: (2005)
A Case Study Of Redtone International Berhad
by: Mustafa, Muhamad Sabri
Published: (2005)
by: Mustafa, Muhamad Sabri
Published: (2005)
Wavelength Converters Placement In All Optical Networks Using Particle Swarm Optimization
by: Teo , Choon Fang
Published: (2005)
by: Teo , Choon Fang
Published: (2005)
A Case Study Of SOHU
by: Kui, Zhang Wen
Published: (2005)
by: Kui, Zhang Wen
Published: (2005)
Analysis Of Deflection Routing Multihop Lightwave Networks With Limited Number Of Wavelength Converters
by: Koa , Chong Gee
Published: (2005)
by: Koa , Chong Gee
Published: (2005)
Strategic Implications Of Multimedia Messaging Services (MMS) : Identifying The Opportunities
by: Wu, Chin Gang
Published: (2005)
by: Wu, Chin Gang
Published: (2005)
Usability Study Of Websites From The Perspective Of Student Internet Users
by: Jeyakuma, Robert
Published: (2005)
by: Jeyakuma, Robert
Published: (2005)
Analysis And Design Of Active Grating-Embedded Optical Filters
by: Lim , Kian Yong
Published: (2005)
by: Lim , Kian Yong
Published: (2005)
Evaluation Of Internet Protocal Version 6 (IPV6) Implementations And Comparative Performance Analysis On Different Platforms
by: Syed Mohamed, Sulaiman
Published: (2005)
by: Syed Mohamed, Sulaiman
Published: (2005)
Design Of A Multiwavelength Optical Light Source Using Optical Frequency Comb Generator (OFCG)
by: Thum , Ann
Published: (2005)
by: Thum , Ann
Published: (2005)
A Study On Service Convergence Within A Wireless Metropolitan Area Network (MAN) In Malaysia
by: Tan, Roy Yew Hoong
Published: (2005)
by: Tan, Roy Yew Hoong
Published: (2005)
The Preferences Of Mobile Contents Reguired By Consumers And Factory Influencing The Choice Of Mobile Contents By Different Types Of Consumers
by: Xin, Lim Ke
Published: (2004)
by: Xin, Lim Ke
Published: (2004)
Maxis Communications Berhad: Maintaining Dominance In The Malaysian Mobile Communications Industry
by: Abang Zainal Abidin, Dayang Nuryati
Published: (2004)
by: Abang Zainal Abidin, Dayang Nuryati
Published: (2004)
Design And Performance Analysis Of Mobile Data Networks: WLAN-Cellular Wan Interworking
by: Fredson, Alfred Phiri
Published: (2004)
by: Fredson, Alfred Phiri
Published: (2004)
Efficient Call Admission Control Algorithm For CDMA Communication Systems
by: Chan , Mun Leong
Published: (2005)
by: Chan , Mun Leong
Published: (2005)
The Study Of The Adoption Level Of Wireless Local Area Network (WLAN) By Companies In Cyberjaya Malaysia
by: Vooi, Chang Voon
Published: (2004)
by: Vooi, Chang Voon
Published: (2004)
A Case Study Of Haier Group
by: Shu Hong, Wu
Published: (2005)
by: Shu Hong, Wu
Published: (2005)
Pensonic Holding Berhad Strategies To Achieve Competitiveness
by: Lim, Peng Boon
Published: (2005)
by: Lim, Peng Boon
Published: (2005)
Samsung Electronics Corporation Leadership In Diversified Technological Business
by: Chew, Suan Choo
Published: (2005)
by: Chew, Suan Choo
Published: (2005)
Evaluating Usability Theory Of WWW In Malaysia
by: Wan Mohd Isa, Wan Abdul Rahim
Published: (2005)
by: Wan Mohd Isa, Wan Abdul Rahim
Published: (2005)
A Case Study Of Digi.Com Bhd's Value-Delivery Network
by: Khabele, Tiisetso Slyvia
Published: (2004)
by: Khabele, Tiisetso Slyvia
Published: (2004)
Similar Items
-
AES encryption of resource allocation for ultra-reliable and enhanced mobile broadband IoT applications in fog network
by: Ahmed Alqourabah, Eissa Abdulsalam
Published: (2022) -
Internet Security In China
by: Jia, Xu
Published: (2005) -
Key Management For Multicast Security
by: Daw, Win Aye
Published: (2005) -
Learning Environment For PDA Security
by: Velu , Vengadeshwaran
Published: (2002) -
Smart home security access system using field programmable gate arrays
by: Saleh, Shukur, et al.
Published: (2018)