Search Results - (( based encryption method algorithm ) OR ( data simulation based algorithm ))

Refine Results
  1. 1

    Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection by Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map by Emmanuel Oluwatobi Asani, Godsfavour Biety-Nwanju, Abidemi Emmanuel Adeniyi, Salil Bharany, Ashraf Osman Ibrahim Elsayed, Anas W. Abulfaraj, Wamda Nagmeldin

    Published 2023
    “…The study provides a new chaos-based method and extends the application of the probabilistic approach to the domain of symmetric key image encryption. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Database encryption for a Web-based Claims System by Syed Zulkarnain Syed Idrus

    Published 2008
    “…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
    Get full text
    Thesis
  4. 4

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption by Nurnajmin Qasrina Ann, Ayop Azmi

    Published 2023
    “…Then, this study aims to optimize the hyperparameters of the developed DNN model using the Arithmetic Optimization Algorithm (AOA) and, lastly, to evaluate the performance of the newly proposed deep learning model with Simulated Kalman Filter (SKF) algorithm in solving image encryption application. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Simulation-Based Power Estimation for High Throughput SHA-256 Design on Unfolding Transformation by Shamsiah, Suhaili, Norhuzaimin, Julai, Asrani, Lit, Maimun Binti, Huja Hussin, Mohamad Faizrizwan bin, Mohd Sabri

    Published 2022
    “…Several cryptographic SHA-256 hash algorithms have been developed to enhance the performance of data-protection techniques. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  7. 7

    Privacy-preserving multi-keyword hybrid search over encrypted data in cloud by Singh, N., Kumar, J., Singh, A.K., Mohan, A.

    Published 2022
    “…This algorithmic combination is able to predict the privacy ranking measure of the retrieved data. …”
    Get full text
    Get full text
    Article
  8. 8

    An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography by Abomhara, Mohamed, Khalifa, Othman Omran, Zaidan , A. A., Zaidan , B. B., Zakaria, Omar, Gani, Abdullah

    Published 2011
    “…This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): selective cryptography by Abomhara, Mohamed, Khalifa, Othman O., Zaidan, A.A., Zaidan, B.B., Zakaria, Omar, Gani, Abdullah

    Published 2011
    “…This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Privacy-preserving multi-keyword hybrid search over encrypted data in cloud by Singh, N., Kumar, J., Singh, A.K., Mohan, A.

    Published 2022
    “…This algorithmic combination is able to predict the privacy ranking measure of the retrieved data. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA by Ahmed, Shakil

    Published 2013
    “…This standard uses AESXTS as a building block for the protection of data. For an effective storage encryption implementation, two well known methods are software based encryption and hardware based encryption. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The evaluation of the security of the proposed scheme is based on SVO logic to verify the security of the informal method. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model by Jasim, Ahmed Abdulhadi, Idris, Mohd Yamani Idna, Azzuhri, Saaidal Razalli, Issa, Noor Riyadh, Noor, Noorzaily Mohamed, Kakarla, Jagadeesh, Amiri, Iraj Sadegh

    Published 2019
    “…Furthermore, the attacks are detected and prevented by utilizing secure node authentication, data fragmentation algorithms, fully homomorphic encryption, and access control model. …”
    Get full text
    Get full text
    Article
  15. 15

    An industrial IoT-based blockchain-enabled secure searchable encryption approach for healthcare systems using neural network by Aitizaz Ali, Mohammed Amin Almaiah, Fahima Hajjej, Muhammad Fermi Pasha, Ong Huey Fang, Rahim Khan, Jason Teo, Muhammad Zakarya

    Published 2022
    “…To address these issues, we have proposed a novel group theory (GT)-based binary spring search (BSS) algorithm which consists of a hybrid deep neural network approach. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari by Mohammad Zahari, Mohamad Zakirin

    Published 2014
    “…Nowadays, there are a lot of cryptography method has been applied. One of the most popular cryptography methods is Advance Encryption Standard (AES). …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    A new image encryption algorithm based on single S-box and dynamic encryption step by Wang, Ji Jun, Tan, Soo Fun

    Published 2021
    “…Secondly, a new dynamic encryption step method is proposed to solve the high correlation and deterministic problems in multiple S-box encryptions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Experiment