Search Results - (( its application testing algorithm ) OR ( some applications security algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- some applications »
- its application »
-
1
Cryptography: A New Approach of Classical Hill Cipher
Published 2013Get full text
Get full text
Article -
2
-
3
RISC-V instruction set extension on blockchain application
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Improving GSM Security By Enhancing Randomness Property Of A5/1 Design
Published 2024Get full text
Get full text
Article -
5
Danger theory metaphor in artificial immune system for system call data
Published 2006“…Although, AIS is emerging as general paradigm for wide application area, computer security is its naturally analogous domain. …”
Get full text
Get full text
Thesis -
6
High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring
Published 2021“…Finally, the implementation of the developed embedded algorithms for strain-based applications resulted in a power consumption reduction of 77% compared to centralized processing.…”
Get full text
Get full text
Thesis -
7
An e-voting application using cryptography technology
Published 2020“…The biggest difference between HTTPS and HTTP is security. HTTPS communication protocol is encrypted using Transport Layer Security (TLS) or its predecessor, Secure Sockets Layer (SSL). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…These algorithms are being used as encryption algorithm in Encapsulated Security Payload (ESP) protocol. …”
Get full text
Get full text
Conference or Workshop Item -
10
-
11
Securing password authentication using MD5 algorithm
Published 2014“…Apart from protection, a step toward perfect security has taken by using MD5 algorithm…”
Get full text
Get full text
Undergraduates Project Papers -
12
Security analysis of blowfish algorithm
Published 2013Get full text
Get full text
Conference or Workshop Item -
13
-
14
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
15
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
16
Achieving security by combining Huffman and SLSB algorithms
Published 2013Get full text
Get full text
Get full text
Article -
17
On the security of digital signature protocol based on iterated function systems.
Published 2011“…The proposed algorithm possesses sufficient security against some known attacks applicable on finite field cryptosystems. …”
Get full text
Get full text
Get full text
Article -
18
Security analysis of blowfish algorithm
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
19
An overview of video encryption techniques
Published 2010Get full text
Get full text
Get full text
Article -
20
HISEC: a new lightweight block cipher algorithm
Published 2014“…Lightweight block cipher algorithms are vital for constrained environment. There are many applications need secured lightweight block cipher algorithm like credit card, E-passport and etc. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
