Search Results - (( its application new algorithm ) OR ( some applications security algorithm ))*
Search alternatives:
- some applications »
- its application »
- application new »
- new algorithm »
-
1
-
2
-
3
A new cryptosystem analogous to LUCELG and Cramer-Shoup
Published 2009Get full text
Get full text
Get full text
Article -
4
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…Fingerprint verification has drawn a lot of attention on its approach in biometric since it is one of the most important biometric technologies nowadays and it is widely used in several different applications and areas. …”
Get full text
Get full text
Thesis -
5
Cryptography: A New Approach of Classical Hill Cipher
Published 2013Get full text
Get full text
Article -
6
-
7
-
8
-
9
RISC-V instruction set extension on blockchain application
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
-
11
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Machine learning method is more famous and applicable than others, because it’s more portable and domain independent. …”
Get full text
Get full text
Article -
12
Simulation and Design of an Intelligent Mobile Robot for Fire Fighting
Published 2003“…The application of traditional frangible glass panel and automatic system such as smoke detector or heat detector requires a human response to realise the existence of fire and to perceive and determine its severity. …”
Get full text
Get full text
Thesis -
13
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
14
OPTIMIZATION OFADVANCEDENCRYPTION STANDARD (AES) IN FPGA IMPLEMENTATION USING S-BOX INTEGRATION
Published 2004“…The main objectives are the architectural and algorithmic optimizations of the AES implementation, which would in turn benefit applications that are both speed and area critical. …”
Get full text
Get full text
Final Year Project -
15
-
16
-
17
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Optical soliton perturbation with quadratic-cubic nonlinearity / Mir Asma
Published 2020“…This study is an addendum to the previously reported results on optical solitons solely, in view of the fact that, its fundamental nature as well as its potential applications to optoelectronic communication. …”
Get full text
Get full text
Get full text
Thesis -
19
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…These algorithms are being used as encryption algorithm in Encapsulated Security Payload (ESP) protocol. …”
Get full text
Get full text
Conference or Workshop Item -
20
Securing password authentication using MD5 algorithm
Published 2014“…Apart from protection, a step toward perfect security has taken by using MD5 algorithm…”
Get full text
Get full text
Undergraduates Project Papers
