<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:dim="http://www.dspace.org/xmlns/dspace/dim" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
    <responseDate>2026-04-17T21:53:50.459Z</responseDate>
    <request verb="GetRecord" identifier="ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:2:187" metadataPrefix="dim">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai</request>
    <GetRecord>
        <record>
            <header>
                <identifier>ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:2:187</identifier>
                <datestamp>2013-10-21T19:50:25Z</datestamp>
                <setSpec>2</setSpec>
            </header>
            <metadata>
                <dim:dim>
                    <dim:field mdschema="dc" element="title" lang="en">Quantification of the Different Security Algorithms in Wireless Network</dim:field>
                    <dim:field mdschema="dc" element="date" qualifier="issued">2012</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="uri">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai/record/2/187</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="uri">http://paper.ijcsns.org/07_book/html/201206/201206003.html</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="id:672" confidence="-1">A. Gheryiani</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="orcid::0000-0001-6136-1895" confidence="-1">M. Veinović</dim:field>
                    <dim:field mdschema="dc" element="description" qualifier="abstract">This paper studies and measures the effect of different security 
algorithms on the performance of a wireless LAN. Real 
experiments were performed on a wireless LAN and the data 
obtained was analyzed for throughput, jitter and delay under 
different security scenarios. Both TCP and UDP traffic streams 
were analyzed at three different data rates. The effect of 
congestion is also measured. The results tell that no important 
degradation in performance occurs by enabling security 
algorithms in a wireless LAN. In low bit rate, it shows there is no 
important degradation, but in case of high rate more than channel 
rate, it shows there is influence</dim:field>
                    <dim:field mdschema="dc" element="type">article</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="volume">12</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="issue">6</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="spage">18</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="epage">27</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="issn">1738-7906</dim:field>
                    <dim:field mdschema="dc" element="source">IJCSNS International Journal of Computer Science and Network Security</dim:field>
                </dim:dim>
            </metadata>
        </record>
    </GetRecord>
</OAI-PMH>
