Search Results - (( based application ria algorithm ) OR ( _ applications security algorithm ))*
Search alternatives:
- based application »
- application ria »
- _ applications »
- ria algorithm »
-
1
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
2
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
3
Improving the security of LBlock lightweight algorithm using bit permutation
Published 2013Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Application of artificial intelligence (AI) in islamic investments
Published 2020“…The technology helps investors to analyse their stocks in terms of price levels, the current stability of each stock and the future price forecasts based on current price and stock data. The study is a conceptual discussion on the application of AI in Islamic investment, which focuses on the discussion of Text Mining, Algorithmic Trading, Stock Pick and Robo in Investment, which include Robo Advisor, Robo Islamic Advisor (RIA) and Robo Financial Advisor (RFA) operating in Islamic investment system. …”
Get full text
Get full text
Get full text
Article -
5
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…The existing sequential and the proposed parallel algorithms were simulated successfully while preserving security properties. …”
Get full text
Get full text
Thesis -
6
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
7
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…In comparison to the standard bioinspired algorithms and existing secure routing protocols, the proposed system reduces average energy consumption by nearly 50% regardless of the increase in the number of nodes and end-to-end delay of 40%, while finding the secure and optimal path in unison is designed to ensure trust in the IoT environment.…”
Get full text
Get full text
Get full text
Get full text
Article -
8
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
Enhanced chaotic image encryption algorithm based on Baker's map
Published 2003Get full text
Get full text
Article -
10
Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT
Published 2021Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
-
12
Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications
Published 2023Conference Paper -
13
An enhancement of the random sequence 3-level obfuscated algorithm for protecting agents malicious hosts
Published 2007“…With the advent of agent technology, the need for security of applications becomes a concern that is beyond classical data security capability and considerations. …”
Get full text
Get full text
Article -
14
Security analysis of blowfish algorithm
Published 2013Get full text
Get full text
Conference or Workshop Item -
15
Security factors based evaluation of verification algorithm for an IoT access system
Published 2023“…Soft computing; Internet of Things (IOT); QR tag; Security Architecture; Security factors; Security objectives; Smart access; Smart city applications; Verification algorithms; Internet of things…”
Conference Paper -
16
New Cryptographic Algorithms for Enhancing Security of Voice Data
Published 2010“…The proposed solution was implemented and tested and the results showed that the required time for the security processes is minimized compared to some known algorithms such as AES_Rijndael algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Web-Application for securing message using Steganography with LSB Algorithm and Hybrid Encryption / Muhammad Khairul Amin Mohd Nai and Siti Rahayu Abdul Aziz
Published 2021Subjects: “…Algorithms…”
Get full text
Get full text
Get full text
Book Section -
18
Web-Application for securing message using Steganography with LSB Algorithm and Hybrid Encryption / Muhammad Khairul Amin Mohd Nai and Siti Rahayu Abdul Aziz
Published 2021Subjects: “…Algorithms…”
Get full text
Get full text
Get full text
Book Section -
19
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007Get full text
Get full text
Conference or Workshop Item -
20
