Search Results - (( some applications security algorithm ) OR ( based applications using algorithm ))*

Refine Results
  1. 1

    Securing password authentication using MD5 algorithm by Siti Nabilah , Mohammad Zain

    Published 2014
    “…Apart from protection, a step toward perfect security has taken by using MD5 algorithm…”
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7

    On the security of digital signature protocol based on iterated function systems. by M. G. AL-Saidi, Nadia, Md. Said, Mohamad Rushdan

    Published 2011
    “…The proposed algorithm possesses sufficient security against some known attacks applicable on finite field cryptosystems. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10
  11. 11

    An enhanced color image encryption algorithm using LT-PRNG by Mohammed Ismael, Saba

    Published 2018
    “…Only the authorized receiver can decrypt the ciphertext with the secret key(s) to obtain the plaintext. Several chaos-based image encryption algorithms use low-dimension chaos as the encryption tools. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…The MAC value is stored in the authentication data files of the Authentication Header and Encapsulating Security Payload. This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…The MAC value is stored in the authentication data files of the Authentication Header and Encapsulating Security Payload. This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Applications of deep learning algorithms for supervisory control and data acquisition intrusion detection system by Balla, Asaad, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Mubarak, Sinil

    Published 2022
    “…For each algorithm, prior works have been identified, examined, and described based on their conceptual similarities. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin by Shamsudin, Farah Syadiyah

    Published 2017
    “…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Efficient and secured compression and steganography technique in wireless sensor network by Tuama, Ammar Yaseen

    Published 2016
    “…The proposed solution comes with low complexity and is used to en- hance the security of the standard LSB algorithm by replacing an originally less secured sequential data hiding with a random pixel selection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20