Search Results - (( based application a algorithm ) OR ( some applications security algorithm ))*

Refine Results
  1. 1
  2. 2

    Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof by Md Taujuddin, Nik Shahidah Afifi, Abdullah, Abdul Hanan, Maarof, Mohd Aizaini

    Published 2006
    “…The Internet Protocol Security (IPSec) is a standard-based method that being used to protect the information that traverse in the Internet networking without expensive cost or complex modification on Internet application itself. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Securing password authentication using MD5 algorithm by Siti Nabilah , Mohammad Zain

    Published 2014
    “…Apart from protection, a step toward perfect security has taken by using MD5 algorithm…”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    On the security of digital signature protocol based on iterated function systems. by M. G. AL-Saidi, Nadia, Md. Said, Mohamad Rushdan

    Published 2011
    “…The proposed algorithm possesses sufficient security against some known attacks applicable on finite field cryptosystems. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Applications of deep learning algorithms for supervisory control and data acquisition intrusion detection system by Balla, Asaad, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Mubarak, Sinil

    Published 2022
    “…For each algorithm, prior works have been identified, examined, and described based on their conceptual similarities. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    An enhanced color image encryption algorithm using LT-PRNG by Mohammed Ismael, Saba

    Published 2018
    “…Although these algorithms are simple and effective to some extent, most of them are inefficient due to the following reasons: firstly, there is a low security due to the dynamic degradation of chaotic systems in their realization with a digital computer; secondly, some low-dimension chaos-based encryptions have slow performance speeds because of analytical floating-point computations which makes encryption infeasible in real time. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin by Shamsudin, Farah Syadiyah

    Published 2017
    “…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Efficient and secured compression and steganography technique in wireless sensor network by Tuama, Ammar Yaseen

    Published 2016
    “…The proposed solution comes with low complexity and is used to en- hance the security of the standard LSB algorithm by replacing an originally less secured sequential data hiding with a random pixel selection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20