Search Results - (( based application among algorithm ) OR ( some applications security algorithm ))*
Search alternatives:
- based application »
- application among »
- some applications »
- among algorithm »
-
1
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
Published 2006Get full text
Get full text
Monograph -
2
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
Get full text
Get full text
Get full text
Article -
3
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
-
5
-
6
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…The performance of AI algorithms is enhanced through the data obtained from a data repository or a reliable, secure, trustworthy, and credible platform. …”
Get full text
Get full text
Get full text
Article -
7
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…The performance of AI algorithms is enhanced through the data obtained from a data repository or a reliable, secure, trustworthy, and credible platform. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
8
Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri
Published 2017“…There are four phases involved which are inception, elaboration, construction and lastly, transition. As expected, the algorithm applied in this project is effective and can help users to increase their home security level. …”
Get full text
Get full text
Thesis -
9
Danger theory metaphor in artificial immune system for system call data
Published 2006“…Although, AIS is emerging as general paradigm for wide application area, computer security is its naturally analogous domain. …”
Get full text
Get full text
Thesis -
10
-
11
Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)
Published 2017“…It employs multi-level detection based on identity and position verification. Then, a trust algorithm is applied based on the energy of each sensor node. …”
Get full text
Get full text
Get full text
Article -
12
A Hybrid Chaotic Image Encryption Scheme Bas~d on S-Box and Ciphertext Feedback
Published 2007“…Due to some intrinsic features of images, such as bulk data capacity and high correlation among pixels, traditional encryption algorithms such as IDEA, DES and AES are not suitable for practical image encryption, especially for real time applications. …”
Get full text
Get full text
Thesis -
13
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…These algorithms are being used as encryption algorithm in Encapsulated Security Payload (ESP) protocol. …”
Get full text
Get full text
Conference or Workshop Item -
15
Applying Bayesian probability for Android malware detection using permission features
Published 2021“…By using static analysis, this study focuses on permission features that are significant in Android applications. The experiments conducted using chi-square as an algorithm and Naïve Bayes as a classifier. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Securing password authentication using MD5 algorithm
Published 2014“…Apart from protection, a step toward perfect security has taken by using MD5 algorithm…”
Get full text
Get full text
Undergraduates Project Papers -
17
Security analysis of blowfish algorithm
Published 2013Get full text
Get full text
Conference or Workshop Item -
18
-
19
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
20
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers
