Search Results - (( based application security algorithm ) OR ( its application design algorithms ))*
Search alternatives:
- application design »
- based application »
- its application »
-
1
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
2
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
3
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…The MAC value is stored in the authentication data files of the Authentication Header and Encapsulating Security Payload. This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…The MAC value is stored in the authentication data files of the Authentication Header and Encapsulating Security Payload. This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
-
6
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
7
Glass break detection system using deep auto encoders with fuzzy rules induction algorithm
Published 2019“…This paper proposes a new design of a glass break detection algorithm based on Fuzzy Deep Auto-encoder Neural Network. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
Published 2018“…Our framework categorises the requirements for the VANET protection design via modifying AODV into three: Insure the Availability of VANET and its Services Algorithm (IAVSA), Protect Data Dissemination Algorithm (PDDA), and Secure Vehicles Authentication Algorithm (SVAA). …”
Get full text
Get full text
Get full text
Thesis -
9
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
Published 2019“…To investigate its performance in terms of security, a new chaos-based image encryption algorithm is also proposed. …”
Get full text
Get full text
Thesis -
10
-
11
An Improved Rectangle Lightweight Block Cipher Based On 3d Rotation Method
Published 2024thesis::doctoral thesis -
12
Towards designing a blockchain-based model for e-book publishing
Published 2025“…Based on these insights, a conceptual blockchain-based smart contract model for e-book publishing was proposed using Ethereum platform, incorporating InterPlanetary File System (IPFS) storage and cryptographic algorithms. …”
Get full text
Get full text
Get full text
Article -
13
Optimization of medical image steganography using n-decomposition genetic algorithm
Published 2023“…However, further validation is required to determine its effectiveness in real-world applications.…”
Get full text
Get full text
Get full text
Thesis -
14
Enhancement Of Cover Selection – Based Audio Steganography (CAS) Using Block-Based Chaotic Multi – Level Lsb (BCM– LSB) For Balanced Performance
Published 2024thesis::doctoral thesis -
15
Cryptanalysis and design of chaos based image encryption schemes
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Statistical analysis on enhanced 3D-AES block cipher cryptographic algorithm / Nor Azeala Mohd Yusof
Published 2021“…It can be concluded that Enhanced 3D-AES meets the standard security requirements for block cipher design. It is strongly suggested to implement Enhanced 3D-AES in software applications to secure data transmission.…”
Get full text
Get full text
Thesis -
17
Analysis of parabolic antennas for radio telescopes and the development of encryption methods for radio astronomical images
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…We have developed a cloud-based application that adapts the enhanced authentication method, and its security measurement were evaluated using IBM Application Security on Cloud tool. …”
Get full text
Get full text
Get full text
Thesis -
19
-
20
