Search Results - (( based encryption path algorithm ) OR ( java implementation re algorithm ))
Search alternatives:
- java implementation »
- implementation re »
- path algorithm »
- re algorithm »
-
1
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Conference or Workshop Item -
2
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
Get full text
Get full text
Get full text
Article -
3
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…It involves the process of re-testing software after modifications. Ideally, to perform regression testing is to re-execute all the test cases on the modified software. …”
Get full text
Get full text
Thesis -
4
Image orientation watermarking technique for copyright protection
Published 2016“…In return, a copyright gains its validity based on such robust characteristics. Watermarking attracts much interest in algorithm design to enable a signature to be embedded on secrecy and encryption beds. …”
Get full text
Get full text
Get full text
Thesis
