Search Results - (( _ application during algorithm ) OR ( its applications security algorithm ))*
Search alternatives:
- application during »
- during algorithm »
- its applications »
-
1
A study of mobile IP and its security aspects in a LAN environment / Suhaila Che Ismail
Published 1998“…A security criteria, outlines the authentication algorithm and key to be used during the registration process. …”
Get full text
Get full text
Thesis -
2
A study on one way hashing function and its application for FTMSK webmail / Mohd Rosli Mohd Daud
Published 2007Get full text
Get full text
Research Reports -
3
-
4
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…The performance proposed encryption algorithm was promising which could be a starting point for detailed analysis and implementation in real application domains.…”
Get full text
Get full text
Get full text
Article -
5
A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate
Published 2019“…To conform to the application requirements of the IoT, the new algorithm improves w-NAF, where w=4. …”
Get full text
Get full text
Thesis -
6
-
7
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
Get full text
Get full text
Get full text
Article -
8
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Analysis of parabolic antennas for radio telescopes and the development of encryption methods for radio astronomical images
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
-
11
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…We have developed a cloud-based application that adapts the enhanced authentication method, and its security measurement were evaluated using IBM Application Security on Cloud tool. …”
Get full text
Get full text
Get full text
Thesis -
12
Deployment of new dynamic cryptography buffer for SCADA security enhancement
Published 2014“…The DCB contains several fields/sub-fields which have been used during implementation of cryptography algorithm and other information ( or detail) related with protocol security. …”
Get full text
Get full text
Get full text
Article -
13
RISC-V instruction set extension on blockchain application
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
-
15
Adaptive artificial neural network for power system security assessment and control action
Published 2012“…This study also investigates the reliability of ANN application in power system security assessment in terms of accuracy and computational time as well as developing a new method that can be included in security assessment tools. …”
Get full text
Get full text
Thesis -
16
Elimination of raindrops effects in infrared sensitive camera
Published 2007Get full text
Get full text
Get full text
Thesis -
17
A new algorithm for human face detection using skin color tone
Published 2013“…Human face recognition systems have gained a considerable attention during last decade due to its vast applications in the field of computer and advantages over previous biometric methods. …”
Get full text
Get full text
Get full text
Article -
18
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…To date, this research found no known practical implementation of the AAḃ algorithm to prove or to validate its efficiency on a real-world computing platform. …”
Get full text
Get full text
Thesis -
19
-
20
A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael
Published 2010“…Originally, this service was not designed to transmit secured data, so the security was not an important issue during its design. …”
Get full text
Get full text
Get full text
Article
