Search Results - (( based application new algorithm ) OR ( some applications security algorithm ))*
Search alternatives:
- based application »
- some applications »
- application new »
- new algorithm »
-
1
Achieving security by combining Huffman and SLSB algorithms
Published 2013Get full text
Get full text
Get full text
Article -
2
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…These algorithms are being used as encryption algorithm in Encapsulated Security Payload (ESP) protocol. …”
Get full text
Get full text
Conference or Workshop Item -
3
-
4
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
5
-
6
On the security of digital signature protocol based on iterated function systems.
Published 2011“…The proposed algorithm possesses sufficient security against some known attacks applicable on finite field cryptosystems. …”
Get full text
Get full text
Get full text
Article -
7
A new cryptosystem analogous to LUCELG and Cramer-Shoup
Published 2009Get full text
Get full text
Get full text
Article -
8
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…In fact, the growing demands for new and much complex WSN applications require optimising both efficiency and security of data communication archetype in order to counterbalance their intrinsic limitations. …”
Get full text
Get full text
Get full text
Thesis -
9
An Enhanced Hybrid Method Using AES Algorithm And Arabic Text Steganography
Published 2024thesis::master thesis -
10
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
11
-
12
Conceptual deployment models to secure cloud computing / Hajar Ziglari
Published 2012“…The next step will be about development and corresponding interfaces and design patterns for applications to fit the deployment models and working on security protocols and algorithms in the proposed models to have security support in the cryptography part.…”
Get full text
Get full text
Thesis -
13
-
14
-
15
RISC-V instruction set extension on blockchain application
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
17
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Nowadays more researchers use three type of approaches namely, Rule-base NER, Machine Learning-base NER and Hybrid NER to identify names. …”
Get full text
Get full text
Article -
18
A new mobile malware classification for call log exploitation
Published 2024journal::journal article -
19
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
Published 2004“…To identify the best cryptographic algorithm suitable for smartcard applications, the dissertation also investigates the implementation of Elliptic Curve encryption techniques and presents performance comparisons based on similar techniques. …”
Get full text
Get full text
Thesis -
20
Simulation and Design of an Intelligent Mobile Robot for Fire Fighting
Published 2003“…A method of Path Recognition Algorithms (PRA) providing robots the autonomous ability to judge purpose of action likes human base on the input sensors from the environment. …”
Get full text
Get full text
Thesis
