Search Results - (( based application a algorithm ) OR ( some applications security algorithm ))*
Search alternatives:
- based application »
- some applications »
- application a »
- a algorithm »
-
1
Achieving security by combining Huffman and SLSB algorithms
Published 2013Get full text
Get full text
Get full text
Article -
2
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…The Internet Protocol Security (IPSec) is a standard-based method that being used to protect the information that traverse in the Internet networking without expensive cost or complex modification on Internet application itself. …”
Get full text
Get full text
Conference or Workshop Item -
3
Securing password authentication using MD5 algorithm
Published 2014“…Apart from protection, a step toward perfect security has taken by using MD5 algorithm…”
Get full text
Get full text
Undergraduates Project Papers -
4
-
5
-
6
-
7
-
8
On the security of digital signature protocol based on iterated function systems.
Published 2011“…The proposed algorithm possesses sufficient security against some known attacks applicable on finite field cryptosystems. …”
Get full text
Get full text
Get full text
Article -
9
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
10
Applications of deep learning algorithms for supervisory control and data acquisition intrusion detection system
Published 2022“…For each algorithm, prior works have been identified, examined, and described based on their conceptual similarities. …”
Get full text
Get full text
Get full text
Article -
11
Two-Phases QR Authentication Algorithm (2PQRA) for Digital Energy and IoT Applications
Published 2023Conference Paper -
12
An Enhanced Hybrid Method Using AES Algorithm And Arabic Text Steganography
Published 2024thesis::master thesis -
13
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. …”
Get full text
Get full text
Get full text
Article -
14
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
Published 2006Get full text
Get full text
Monograph -
16
An enhanced color image encryption algorithm using LT-PRNG
Published 2018“…Although these algorithms are simple and effective to some extent, most of them are inefficient due to the following reasons: firstly, there is a low security due to the dynamic degradation of chaotic systems in their realization with a digital computer; secondly, some low-dimension chaos-based encryptions have slow performance speeds because of analytical floating-point computations which makes encryption infeasible in real time. …”
Get full text
Get full text
Thesis -
17
Symmetric Key Size for Different Level of Information Classification
Published 2006Get full text
Get full text
Conference or Workshop Item -
18
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
19
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…The proposed solution comes with low complexity and is used to en- hance the security of the standard LSB algorithm by replacing an originally less secured sequential data hiding with a random pixel selection. …”
Get full text
Get full text
Get full text
Thesis -
20
