Search Results - (( based applications security algorithm ) OR ( _ application server algorithm ))*
Search alternatives:
- based applications »
- application server »
- server algorithm »
-
1
-
2
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Based on the performance simulations, the new parallel algorithm gained speedup of 1.74 with 85% efficiency over the current sequential algorithm. …”
Get full text
Get full text
Thesis -
3
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007Get full text
Get full text
Conference or Workshop Item -
4
-
5
Implementing RC5 Encrtption Algorithm On a Web Based Medical Cosultation System
Published 2007“…Even though security requirements in medical care are traditionally high, most computerized medical care applications lack sophisticated security measures or focus only on single security objectives. …”
Get full text
Get full text
Thesis -
6
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
Published 2016“…In this thesis, we have proposed a security solution based on an ECC algorithm to improve the security and the performance of the data by dividing the file content and encrypting it on both the server and the client side. …”
Get full text
Get full text
Thesis -
7
-
8
Developing a prototype e-commerce application with credit card validation and secure transaction
Published 2005“…The application also includes an online credit card validation module that validates credit cards against the Luhn Algorithm and predefined credit card prefixes.The application will accept three types of credit cards which are Mastercard,Visa and American Express.The application is developed on the NET platform using ASP.NET and Visual Basic NET scripting.Therefore,the application could run on all kinds of platform.The application requires a Microsoft Server based operating system and Microsoft SQL Server in order for it to run.The application has been tested and runs successfully both on a server and on a workstation with server settings.In short,this system is the solution to the problems of current e-commerce technology.…”
Get full text
Get full text
Undergraduates Project Papers -
9
OTS: an optimal tasks scheduling algorithm based on QoS in cloud computing network
Published 2019“…These resources contain storage, servers, and other applications and it provides security, flexibility, and scalability. …”
Get full text
Get full text
Article -
10
-
11
An optimal tasks scheduling algorithm based on QoS in cloud computing network
Published 2017“…These resources contain storage, servers, and other applications and it provides security, flexibility, and sealability. …”
Get full text
Get full text
Thesis -
12
Secure lightweight client for cloud-based E-Health Model
Published 2023“…Thirdly, an authorization algorithm named federated proxy implements for fine-grained access control based on CP-ABE (FPI-CP-ABE) is proposed. …”
Get full text
Get full text
Get full text
Thesis -
13
Systematic literature review: Trend analysis on the design of lightweight block cipher
Published 2024journal::journal article -
14
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The new replication process will also be used in e-commerce application to secure user transaction information. …”
Get full text
Get full text
Thesis -
15
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
16
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
17
-
18
Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri
Published 2021“…Numerous data security and hiding algorithms have been developed in the last decade. …”
Get full text
Get full text
Student Project -
19
Secure policies for the distributed virtual machines in mobile cloud computing
Published 2020“…Furthermore, an algorithm that enables secure communication among distributed VMs and protection of sensitive data in VMs on the cloud is proposed. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
