Search Results - (( based applications a algorithm ) OR ( _ applications security algorithm ))*
Search alternatives:
- based applications »
- applications a »
- _ applications »
- a algorithm »
-
1
Enhanced chaotic image encryption algorithm based on Baker's map
Published 2003Get full text
Get full text
Article -
2
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…In order to provide an energy-efficient and secure routing method for sensors deployed within a dynamic IoT network, this paper presents a trust-aware enhanced ant colony optimization (ACO)-based routing algorithm, incorporating a lightweight trust evaluation model. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT
Published 2021Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
5
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
7
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
8
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…This is due to the cryptography operations that include the HMAC and symmetric encryptions. The thesis proposes a new algorithm that provides a significant performance gain in bulk data transfer without compromising the security. …”
Get full text
Get full text
Thesis -
9
-
10
Implementing RC5 Encrtption Algorithm On a Web Based Medical Cosultation System
Published 2007“…This project is a web based application for medical consultation system, it describes a special security way to process a medical care data which transporting through a public networks such as the Internet. …”
Get full text
Get full text
Thesis -
11
-
12
Achieving security by combining Huffman and SLSB algorithms
Published 2013Get full text
Get full text
Get full text
Article -
13
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
Get full text
Get full text
Get full text
Article -
14
-
15
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
-
17
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
18
-
19
-
20
A new image encryption algorithm based on single S-box and dynamic encryption step
Published 2021“…Chaotic-based S-box image encryption schemes promise to be a practical solution for securing digital images. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Experiment
