Improving Geo-encryption protocol for mobile networks / Karim Mohsen Mahmoud Elbatran ; Supervised Imane Ali Saroit Ismail , Amira Kotb
Material type:
- تحسين بروتوكول التشفير الجغرافي للشبكات المتحركة [Added title page title]
- Issued also as CD
Item type | Current library | Home library | Call number | Copy number | Status | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
قاعة الرسائل الجامعية - الدور الاول | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.20.01.M.Sc.2010.Ka.I (Browse shelf(Opens below)) | Not for loan | 01010110054342000 | ||
![]() |
مخـــزن الرســائل الجـــامعية - البدروم | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.20.01.M.Sc.2010.Ka.I (Browse shelf(Opens below)) | 54342.CD | Not for loan | 01020110054342000 |
Browsing المكتبة المركزبة الجديدة - جامعة القاهرة shelves Close shelf browser (Hides shelf browser)
No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | ||
Cai01.20.01.M.Sc.2010.Hu.I Improving the performance of image recovery over computer networks / | Cai01.20.01.M.Sc.2010.Hu.I Improving the performance of image recovery over computer networks / | Cai01.20.01.M.Sc.2010.Ka.I Improving Geo-encryption protocol for mobile networks / | Cai01.20.01.M.Sc.2010.Ka.I Improving Geo-encryption protocol for mobile networks / | Cai01.20.01.M.Sc.2010.Sa.E Energy efficient routing protocol for wireless sensor networks / | Cai01.20.01.M.Sc.2010.Sa.E Energy efficient routing protocol for wireless sensor networks / | Cai01.20.01.M.Sc.2011.Ah.I Improving the performance of near-lossless image compression / |
Thesis (M.Sc.) - Cairo University - Faculty of Computers and Information - Department of Information Technology
The wide spread of WLAN and the popularity of mobile devices increase the frequency of data transmission among mobile users. However, most of the data encryption technology is location-independent. The encryption technology cannot restrict the location of data decryption. Therefore, our objective is to add a layer of security to the network without breaking the network rules and to decrease network traffic
Issued also as CD
There are no comments on this title.