Search Results - (( data protection device algorithm ) OR ( java application using algorithm ))
Search alternatives:
- protection device »
- device algorithm »
- java application »
- using algorithm »
-
1
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
2
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We used a Drebin data sample, which is a collection of 5,560 applications, as well as clean data sample containing 1,846 applications. …”
Get full text
Get full text
Get full text
Thesis -
3
Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure
Published 2011“…This has been meticulously done by soliciting the relay knowledge domain from protection experts who are usually constrained by their experience and expertise, strenuously manually perusing tremendous amount of data in event report and traditionally relying on such intelligent electronic devices as digital fault recorders, sequence of event recorders and SCADA’s remote terminal units that are lacked of detailed protection information. …”
Get full text
Get full text
Thesis -
4
User authentication for mobile devices using motion sensors based on Moore’s neighborhood / Muhammad Asyraf Akop
Published 2017“…Therefore it needs some kind of protection to avoid unauthorized access to the data inside. …”
Get full text
Get full text
Student Project -
5
Discovering decision algorithm from a distance relay event report
Published 2009“…Nowadays protection engineers are suffering from very complex implementations of protection system analysis due to massive quantities of data coming from diverse points of intelligent electronic devices. …”
Get full text
Get full text
Get full text
Article -
6
Implementation of a parallel XTS encryption mode of operation
Published 2014“…It is known that the most efficient techniques to protect storage devices are using cryptography. Developing newer and more secure encryption algorithms and modes of operation might be critically important to protect these devices since conventional disk encryption algorithms, such as CBC mode, have shown serious security flaws. …”
Get full text
Get full text
Get full text
Article -
7
A parallel XTS encryption mode of operation
Published 2009“…It is known that the most efficient techniques to protect storage devices are using cryptography. Developing newer and more secure encryption algorithms and modes of operation might be critically important to protect these devices since conventional disk encryption algorithms, such as CBC mode, have shown serious security flaws. …”
Get full text
Get full text
Conference or Workshop Item -
8
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
9
Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment
Published 2024“…This paper presents the design, simulation, and performance measurement of Simon encryption algorithm in IoT environment. Simon algorithm is a lightweight encryption algorithm which suitable for resource constraint environment like IoT devices. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
-
11
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…This paper presents a solution to protect users from location-dependent attacks by improving the existing clique based cloaking algorithm. …”
Get full text
Get full text
Article -
12
Rough-Set-and-Genetic-Algorithm based data mining and Rule Quality Measure to hypothesize distance protective relay operation characteristics from relay event report
Published 2011“…Firstly, the data mining approach of the integrated-Rough-Set-and-Genetic-Algorithm is used to discover the relay CD-decision algorithm. …”
Get full text
Get full text
Article -
13
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
14
-
15
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
16
Secure Hybrid Scheme For Securing Mqtt Protocol Based On Enhanced Symmetric Algorithm
Published 2023“…Meanwhile, the existing schemes for protecting the MQTT network have added processing overhead to the devices but remain vulnerable for various attacks. …”
Get full text
Get full text
Thesis -
17
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…Recently the group has approved the P1619 standard called "IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices". …”
Get full text
Get full text
Thesis -
18
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…The issue of providing end-toend data protection should has been given highest priority by IoT application developer because the data in both private and public networks can be modified and disrupted by attacker. …”
Get full text
Get full text
Thesis -
19
Advanced current and power consumption monitoring with overload protection / Dinie Haqeemy Abdul Mu'izz
Published 2024“…The system combines modern current and power monitoring devices with an intelligent overload protection mechanism. …”
Get full text
Get full text
Student Project -
20
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
Published 2006“…For this project, the design entry used is Altera’s Quartus II Version 5.0 and the targeted hardware is Altera’s Flex10K FPGA device. By using FPGA device, data can be encrypted or decrypted in real time and this would be a great tool for security purpose, such as ATM machine. …”
Get full text
Get full text
Monograph
