Search Results - (( its applications security algorithm ) OR ( its application means algorithm ))*
Search alternatives:
- application means »
- its applications »
- its application »
- means algorithm »
-
1
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
-
3
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
Published 2017“…AES is being used widely in many applications since it is known for its faster encryption and decryption process and its strength. …”
Get full text
Get full text
Thesis -
4
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
Published 2013Get full text
Get full text
Conference or Workshop Item -
5
-
6
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
-
8
-
9
Optimization of multi-holes drilling toolpath using tiki-taka algorithm
Published 2024“…Future research should prioritize exploring the potential of TTA for integration into automated manufacturing processes and its applicability in maximizing efficiency advantages in other optimization tasks.…”
Get full text
Get full text
Thesis -
10
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
Published 2019“…To investigate its performance in terms of security, a new chaos-based image encryption algorithm is also proposed. …”
Get full text
Get full text
Thesis -
11
Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway
Published 2023“…Unmanned Aerial Vehicles (UAVs) have a lot of potential for developing new applications in a variety of fields, such as traffic monitoring, security, and military applications. …”
Get full text
Get full text
Get full text
Article -
12
Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim
Published 2018“…It can be concluded that the modified algorithm decreases the biases, the variances and the mean squared errors of the LTS estimators. …”
Get full text
Get full text
Thesis -
13
Multi-objective portfolio selection with skewness preference: An application to the stock and electricity markets / Karoon Suksonghong
Published 2014“…The superiority of this method is its ability to generate a set of MVS efficient portfolios within a single run of algorithm. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Embedded PC based wireless communication using XTEA
Published 2010“…It focuses mainly on cryptography and its implementation in an embedded system. The Extended Tiny Encryption Algorithm (XTEA) is the chosen encryption method. …”
Get full text
Get full text
Undergraduates Project Papers -
15
Application of modal decomposition technique in network traffic prediction
Published 2019“…Network traffic prediction is an important means of network security monitoring, and modal decomposition technology is the key to improve the accuracy of network traffic prediction. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Security system using biometric technology: Design and implementation of voice recognition system (VRS)
Published 2008“…Biometric technology is fast gaining popularity as means of security measures to reduce cases of fraud and theft due to its use of physical characteristics and traits for the identification of individuals. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Steganography For Embedding Data In Digital Image
Published 2003“…This thesis discusses the issues regarding Steganography and its application to multimedia security and communication, addressing both theoretical and practical aspects, and tackling both design and attack problems. …”
Get full text
Get full text
Thesis -
18
An e-voting application using cryptography technology
Published 2020“…The biggest difference between HTTPS and HTTP is security. HTTPS communication protocol is encrypted using Transport Layer Security (TLS) or its predecessor, Secure Sockets Layer (SSL). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Zero distortion-based steganography for handwritten signature
Published 2018“…To the best of our knowledge, this is the first time that a human handwritten signature sample is used for steganography application. In its simplest form, the existence of intra-user variability within handwritten signature samples of an individual is explored using the Kruskal-Wallis hypothesis test. …”
Get full text
Get full text
Get full text
Thesis -
20
Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT
Published 2024journal::journal article
