Search Results - (( based application security algorithm ) OR ( its application design algorithms ))*

Search alternatives:

Refine Results
  1. 1
  2. 2
  3. 3

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…The MAC value is stored in the authentication data files of the Authentication Header and Encapsulating Security Payload. This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…The MAC value is stored in the authentication data files of the Authentication Header and Encapsulating Security Payload. This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    Glass break detection system using deep auto encoders with fuzzy rules induction algorithm by Nyein Naing, Wai Yan, Htike, Zaw Zaw

    Published 2019
    “…This paper proposes a new design of a glass break detection algorithm based on Fuzzy Deep Auto-encoder Neural Network. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector by Abdulkader, Zaid A.

    Published 2018
    “…Our framework categorises the requirements for the VANET protection design via modifying AODV into three: Insure the Availability of VANET and its Services Algorithm (IAVSA), Protect Data Dissemination Algorithm (PDDA), and Secure Vehicles Authentication Algorithm (SVAA). …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Designing new chaotic and hyperchaotic systems for chaos-based cryptography by Kadhim, Al Karawi Hayder Natiq

    Published 2019
    “…To investigate its performance in terms of security, a new chaos-based image encryption algorithm is also proposed. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Towards designing a blockchain-based model for e-book publishing by Mohammadan Makhtar, Maznun Arifa, Admodisastro, Novia, Askarbekkyzy, Suleymenova Laura

    Published 2025
    “…Based on these insights, a conceptual blockchain-based smart contract model for e-book publishing was proposed using Ethereum platform, incorporating InterPlanetary File System (IPFS) storage and cryptographic algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Optimization of medical image steganography using n-decomposition genetic algorithm by Al-Sarayefi, Bushra Abdullah Shtayt

    Published 2023
    “…However, further validation is required to determine its effectiveness in real-world applications.…”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Statistical analysis on enhanced 3D-AES block cipher cryptographic algorithm / Nor Azeala Mohd Yusof by Mohd Yusof, Nor Azeala

    Published 2021
    “…It can be concluded that Enhanced 3D-AES meets the standard security requirements for block cipher design. It is strongly suggested to implement Enhanced 3D-AES in software applications to secure data transmission.…”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…We have developed a cloud-based application that adapts the enhanced authentication method, and its security measurement were evaluated using IBM Application Security on Cloud tool. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20