Search Results - (( _ application among algorithm ) OR ( based applications security algorithm ))*
Search alternatives:
- based applications »
- application among »
- among algorithm »
-
1
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Based on the performance simulations, the new parallel algorithm gained speedup of 1.74 with 85% efficiency over the current sequential algorithm. …”
Get full text
Get full text
Thesis -
2
The TCP-based new AIMD congestion control algorithm
Published 2008Get full text
Get full text
Get full text
Article -
3
A new image scrambling technique using block rotation algorithm based on Rubik’s cube
Published 2013“…Objectives: the objective of this paper is to develop a new efficient image scrambling algorithm by using the Rotation technique in order to break the relationship among image elements (pixels). …”
Get full text
Get full text
Get full text
Article -
4
A Theoretical Comparative Analysis Of Dna Techniques Used In Dna Based Cryptography
Published 2024Get full text
journal::journal article -
5
Consensus algorithms blockchain: a comparative study
Published 2019Get full text
Get full text
Get full text
Get full text
Article -
6
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007Get full text
Get full text
Conference or Workshop Item -
7
-
8
An improved chaotic image encryption algorithm
Published 2018Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
-
10
Controlling algorithm for energy consumption of radio bandwidth to manage coverage area problem
Published 2024Conference Paper -
11
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
Get full text
Get full text
Get full text
Article -
12
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Haze removal algorithm using improved restoration model based on dark channel prior / Dai Zhen
Published 2019“…Among many studies, the dark channel prior (DCP) dehazing algorithm is a major breakthrough in the field of image dehazing technology, and this algorithm has the advantages of simple, real-time and effective, while the limitation is that its shortcomings are mainly on the atmospheric scatting physical model over-reliance, and cannot be chosen to match the size of the filter temple, the lack of applicability of the sky and the image after the dark side. …”
Get full text
Get full text
Get full text
Thesis -
14
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
Published 2006Get full text
Get full text
Monograph -
15
An improved image steganography algorithm based on PVD
Published 2018Get full text
Get full text
Get full text
Get full text
Article -
16
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
17
-
18
-
19
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Mostly, it attacks Android due to its popularity and high usage among end users. Every day, more and more malicious mobile applications (apps) with the botnet capability have been developed to exploit end users' smartphones. …”
Proceedings Paper -
20
