Search Results - (( based application need algorithm ) OR ( based applications security algorithm ))*
Search alternatives:
- based applications »
- based application »
- application need »
- need algorithm »
-
1
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
Get full text
Get full text
Get full text
Article -
2
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
3
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
4
Multi-objective scientific workflow scheduling algorithm in multi-cloud environment for satisfying QoS requirements
Published 2022“…MOS-MWO can thus be applied in cloud-based applications to effectively schedule workflow while achieving significant improvement in the QoS satisfaction rate (QSR) to 4.8% compared with the multi-objective scheduling algorithm (MOS). …”
Get full text
Get full text
Thesis -
5
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
6
Development of DNA-based dynamic key-dependent block cipher
Published 2015Get full text
Get full text
Thesis -
7
A community-based peer-to-peer model based on social networks
Published 2008Get full text
Get full text
Article -
8
Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari
Published 2014“…However, AES users or application that using AES algorithm might face the problem of computational overhead. …”
Get full text
Get full text
Thesis -
9
Randomized pixel selection for enhancing LSB algorithm security against brute-force attack
Published 2017“…It plays a crucial role in a broad range of security applications such as securing message exchange, user authentication and copyrighting. …”
Get full text
Get full text
Article -
10
Blockchain based security framework for device authentication and data communication in decentralized IoT network
Published 2023“…A simplified consensus algorithm is then proposed in the thesis. It offers an identity-based encryption to create a key pair for each device. …”
Get full text
Get full text
Thesis -
11
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…This research aim is to study the performance of an improvised Genetic Algorithm (GA) by formulating its problem-specific algorithm for network intrusion problem. …”
Get full text
Get full text
Thesis -
12
-
13
An Improved Rectangle Lightweight Block Cipher Based On 3d Rotation Method
Published 2024thesis::doctoral thesis -
14
A New Model For Network-Based Intrusion Prevention System Inspired By Apoptosis
Published 2024thesis::doctoral thesis -
15
Secure lightweight client for cloud-based E-Health Model
Published 2023“…Thirdly, an authorization algorithm named federated proxy implements for fine-grained access control based on CP-ABE (FPI-CP-ABE) is proposed. …”
Get full text
Get full text
Get full text
Thesis -
16
An enhanced color image encryption algorithm using LT-PRNG
Published 2018“…In this study, a hybrid chaotic map based on logistic map and tent map is proposed for generating a random sequence for enhancing the encryption performance of image encryption algorithms. …”
Get full text
Get full text
Thesis -
17
-
18
Towards Practical Face Recognition System Employing Row-Based Distance Method In 2dpca Based Algorithms
Published 2014“…This is due to the advantages of face recognition and the potential need for high security in commercial and law enforcement applications. …”
Get full text
Get full text
Thesis -
19
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
20
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article
