Search
Now showing items 11-20 of 30
Evaluating elliptic curve cryptography for use on java card
(2003)
Smart cards are used as trusted storage and data processing systems to store cryptographic
private keys and other valuable information. Java Card promises the ease of programming
in Java to the world of smart cards. ...
Threat modelling for legacy enterprise applications
(2013)
Legacy enterprise applications provide unique challenges for software security personnel. The
size and historical nature of these systems can result in vulnerabilities that do not have the
appropriate countermeasures ...
Dynamically Extending the Reach of Wireless Networks in Determining Movement of Individuals Between Cells
(2011-06-22)
Location Based Systems are now a ubiquitous part of
everyday life, seamlessly assisting us in everything we do from
driving our cars to finding a cab, even preventing us missing our
bus or train stop when oversleeping ...
Automated real-time animation
(2008)
Producing animation for the computer game/entertainment industry is a time-
consuming, difficult process. One approach to maximizing the utility of previously
animated sequences is to blend and warp pre-existing sequences ...
Magnumserver pages: improvements and extensions to java server pages
(2005)
Today vast amounts of services and information are provided by the WWW. By its very
nature, the information involved is changeable; hence static web pages are no longer
adequate and methods of coping with dynamic ...
Fingerprint watermarking using svd and dwt based steganography to enhance security
(2015-09-15)
Identification of persons by way of biometric features has evolved significantly over the
years. During this time, biometric recognition has received much attention due to its need
for security. Amongst the many existing ...
Evaluating techniques of finding a path in a dynamic digital search domain
(2009)
Moving from one point to another in an efficient yet effective manner has always been a
problem for people. The same problem can be related to mathematical graph theory,
where moving from one co-ordinate to another ...
Performance comparison of enterprise applications on mobile operating systems
(Telkomnika, 2011-12)
Due to the advances in mobile phone technology, Smartphones have the ability to access web services within applications the user interacts with to retrieve and send information from and to web services. As Smartphones have ...
A preliminary exploration of database performance for use with ‘big data’ projects in the aviation industry
(2014)
This thesis will demonstrate the effectiveness of processing data for the airline industry using both a MariaDB and MongoDB database. Conclusions will be drawn on pertinent issues such as the performance of processing large ...
Stealth analysis of Network Topology using Spanning Tree Protocol
(2015-05)
Almost every network over the last 30 years is built on Spanning Tree Protocol (STP). This protocol makes topology information available to individual switches by exchanging Bridge Protocol Data Units (BPDUs) containing ...