Search Results - (( its application need algorithm ) OR ( based application security algorithm ))*
Search alternatives:
- based application »
- application need »
- its application »
- need algorithm »
-
1
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
2
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
3
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…Hence, this study aims to improve the limitations found in the existing chaotic-based encryption algorithms for FTP by improving its encryption speed using Henon and Logistic map. …”
Get full text
Get full text
Get full text
Article -
4
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…This research aim is to study the performance of an improvised Genetic Algorithm (GA) by formulating its problem-specific algorithm for network intrusion problem. …”
Get full text
Get full text
Thesis -
5
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
6
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
7
-
8
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
9
Enhancing Cryptographic Resilience through Symmetric Encryption Algorithm Utilizing Variable Length Chromosomes Genetic Algorithm
Published 2026journal::journal article -
10
-
11
An Improved Rectangle Lightweight Block Cipher Based On 3d Rotation Method
Published 2024thesis::doctoral thesis -
12
A security payment model for financial payment using mykad
Published 2011“…ARSA will automatically change its security algorithm based on times and attacks. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
Published 2018“…Our framework categorises the requirements for the VANET protection design via modifying AODV into three: Insure the Availability of VANET and its Services Algorithm (IAVSA), Protect Data Dissemination Algorithm (PDDA), and Secure Vehicles Authentication Algorithm (SVAA). …”
Get full text
Get full text
Get full text
Thesis -
14
Secure lightweight client for cloud-based E-Health Model
Published 2023“…Thirdly, an authorization algorithm named federated proxy implements for fine-grained access control based on CP-ABE (FPI-CP-ABE) is proposed. …”
Get full text
Get full text
Get full text
Thesis -
15
Cryptanalysis and design of chaos based image encryption schemes
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Analysis of parabolic antennas for radio telescopes and the development of encryption methods for radio astronomical images
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
-
18
Digital Certificate-based Authentication Model For Enhanced Smartphone Security
Published 2025journal::journal article -
19
An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network
Published 2016“…The proposed model is developed and simulated on Matlab based on an improved fuzzy vault scheme with a lightweight error correction algorithm to reduce the computational complexity when compared to previous work. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Adaptive artificial neural network for power system security assessment and control action
Published 2012“…This study also investigates the reliability of ANN application in power system security assessment in terms of accuracy and computational time as well as developing a new method that can be included in security assessment tools. …”
Get full text
Get full text
Thesis
