Search Results - ((((conversion algorithm) OR (selection algorithm))) OR (encryption algorithm))
Search alternatives:
- conversion algorithm »
- selection algorithm »
-
1
-
2
Selective video encryption algorithm based on H.264/AVC and AES
Published 2011Get full text
Get full text
Get full text
Book Chapter -
3
Encryption selection for WLAN IEEE802.11G
Published 2013“…As for the solution, it proposes a mechanism of selecting encryption algorithms, which is able to help users to select the suitable encryption algorithm and encryption protocols for their secured communication in IEEE 802.11g WLAN. …”
Get full text
Get full text
Thesis -
4
Secure encryption in network using Data Encryption Standard (DES) for high security transmission
Published 2017“…The Data Encryption Standard (DES) algorithm is a symmetric key algorithm for the encryption of electronic and allowed for information. …”
Get full text
Get full text
Student Project -
5
DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE
Published 2019“…However, computer networks have a lot of vulnerabilities and threats. Previously, many encryption algorithms have been investigated. The Cryptography Algorithm is used to protect data through encryption that allows sensitive information to be passed through the network safely. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
6
Encrypted mobile messaging application using 3D-AES block cipher cryptography algorithm / Aida Najihah Mohd Khlubi
Published 2019“…The process of securing the text is by using the 3Dimensional-Advanced Encryption Standard (3D-AES) block cipher algorithm. …”
Get full text
Get full text
Student Project -
7
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…There are two components in our work. The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). …”
Get full text
Get full text
Get full text
Proceeding Paper -
8
Features selection for IDS in encrypted traffic using genetic algorithm
Published 2013“…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A plain-image correlative semi-selective medical image encryption algorithm using enhanced 2D-logistic map
Published 2023“…A plain-image correlative semi-selective medical image encryption algorithm using enhanced 2D-logistic map by Bahbibi Rahmatullah…”
Get full text
article -
10
Features selection for ids in encrypted traffic using genetic algorithm
Published 2013“…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
DNA sequences compression by GP2R and selective encryption using modified RSA technique
Published 2020“…Secondly, modified RSA technique is proposed for the selection encryption purpose. This selection encryption of the modified RSA technique is an approach to lessen computational resources for greatly sized DNA facts. …”
Get full text
Get full text
Get full text
Article -
12
DESIGN AND IMPLEMENTATION OF RIPEMD-160 HASH FUNCTION USING VERILOG HDL
Published 2022“…Now, sensitive data can be safely transmitted via the network thanks to the Cryptography Algorithm's usage of encryption to safeguard data. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
13
Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar
Published 2012“…Apart from symmetric algorithm, Public Key Infrastructure technologies that one of the asymmetric algorithm have been select as a part of new integration. …”
Get full text
Get full text
Thesis -
14
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Book Section -
15
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Thesis -
16
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…This project proposed a virtual mental health mobile application, called TalkOut, with a lightweight message encryption algorithm to protect patient's profile, conversation messages and treatment history. …”
Get full text
Get full text
Get full text
Academic Exercise -
17
Doctor-patient remote consultation system with secure medical images
Published 2022“…The result was recorded including the run time and encrypted image size. The final selection of the algorithms depended on the encryption size and computation speed. …”
Get full text
Get full text
Get full text
Academic Exercise -
18
Message based random variable length key encryption algorithm.
Published 2009“…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
Get full text
Get full text
Article -
19
Analysis of parabolic antennas for radio telescopes and the development of encryption methods for radio astronomical images
Published 2022“…The proposed algorithms include Development of Bit level Scrambling Encryption for Radio Telescope Imageries, Bit-levels Encryption for RGB Telescope Images, Bit-levels Encryption for RGB Telescope Images, Design of Encryption Algorithm in Combined Spatial and Frequency Domains for Telescope Grayscale and Bayer Images, and Combined Spatial and Frequency Domains in Algorithm of RGB Color Image Security for Telescope Images. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Cyber Threat Extenuation for Substation Data Communication: Evaluation of Encrypt-Authenticator Prototype for IEC 60870-5 Data
Published 2023“…Authentication; Field programmable gate arrays (FPGA); Authentication algorithm; Communication time; Data-communication; Electrical substations; FPGA implementations; Light-weight cryptography; Lightweight encryption; Programmable logic array; Cryptography…”
Conference Paper
