Search Results - (( _ application among algorithm ) OR ( its application security algorithm ))*
Search alternatives:
-
1
Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT
Published 2024journal::journal article -
2
A study of mobile IP and its security aspects in a LAN environment / Suhaila Che Ismail
Published 1998“…Each mobile IP agent needs a different application and independently configured. Therefore, a thorough research is to be accomplished in order to produce the mobile IP to the extent of the security features and the algorithm.…”
Get full text
Get full text
Thesis -
3
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
4
Design and Implementation of MDS Hash Function Algorithm Using Verilog HDL
Published 2020“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Article -
5
An evaluation of feature selection technique for dendrite cell algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
Get full text
Get full text
Get full text
Article -
7
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Haze removal algorithm using improved restoration model based on dark channel prior / Dai Zhen
Published 2019“…Among many studies, the dark channel prior (DCP) dehazing algorithm is a major breakthrough in the field of image dehazing technology, and this algorithm has the advantages of simple, real-time and effective, while the limitation is that its shortcomings are mainly on the atmospheric scatting physical model over-reliance, and cannot be chosen to match the size of the filter temple, the lack of applicability of the sky and the image after the dark side. …”
Get full text
Get full text
Get full text
Thesis -
9
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
10
Design and implementation of MD5 hash function algorithm using verilog HDL
Published 2022“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Mostly, it attacks Android due to its popularity and high usage among end users. Every day, more and more malicious mobile applications (apps) with the botnet capability have been developed to exploit end users' smartphones. …”
Proceedings Paper -
13
-
14
A comprehensive analysis of blockchain-based cryptocurrency mining impact on energy consumption
Published 2022“…Blockchain already has gained popularity due to its highly secured network and same time enormous computational power consumption has become an undifferentiated debate among the users. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Advance video analysis system and its applications
Published 2010“…It recognizes activities in an application environment, such as in a room, supermarket, car, or security checkpoint. …”
Get full text
Get full text
Get full text
Article -
17
Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri
Published 2017“…There are four phases involved which are inception, elaboration, construction and lastly, transition. As expected, the algorithm applied in this project is effective and can help users to increase their home security level. …”
Get full text
Get full text
Thesis -
18
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…Cryptography is the science of hiding information and its applications include ATM cards, computer passwords and electronic commerce in this modern world. …”
Get full text
Get full text
Research Reports -
19
Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway
Published 2023“…Unmanned Aerial Vehicles (UAVs) have a lot of potential for developing new applications in a variety of fields, such as traffic monitoring, security, and military applications. …”
Get full text
Get full text
Get full text
Article -
20
On Clustering Algorithm Of Coverage Area Problems In Wireless Sensor Networks
Published 2024“…Wireless sensor networks (WSN) has applications in many areas such as in surveillance, healthcare, national security, military and environmental monitoring. …”
Article
