Search Results - based ((((encryption algorithm) OR (evolution algorithm))) OR (selection algorithm))
Search alternatives:
- evolution algorithm »
- selection algorithm »
-
1
Encryption selection for WLAN IEEE802.11G
Published 2013“…As for the solution, it proposes a mechanism of selecting encryption algorithms, which is able to help users to select the suitable encryption algorithm and encryption protocols for their secured communication in IEEE 802.11g WLAN. …”
Get full text
Get full text
Thesis -
2
Systematic literature review: Trend analysis on the design of lightweight block cipher
Published 2024journal::journal article -
3
Broadening selection competitive constraint handling algorithm for faster convergence
Published 2020“…The median convergence traces have been compared with two different algorithms based on differential evolution, i:e: Ensemble of Constraint Handling Techniques (ECHT) and Stochastic Ranking Differential Evolution (SRDE). …”
Get full text
Get full text
Article -
4
DNA sequences compression by GP2R and selective encryption using modified RSA technique
Published 2020“…The running time is a few seconds of this algorithm. This is a hybrid approach to the compression & encryption process. …”
Get full text
Get full text
Get full text
Article -
5
-
6
Message based random variable length key encryption algorithm.
Published 2009“…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
Get full text
Get full text
Article -
7
Comparison of ECC and RSA algorithms in IOT devices
Published 2019“…Based on the findings, the ECC algorithm outperforms RSA in a constrained environment in terms of memory requirements, energy consumption, key sizes, signature generation time, key generation and execution time, and decryption time while RSA performs better in verifying the signature and encrypting.…”
Get full text
Get full text
Article -
8
Secure mobile AES encryptor (SMAE)
Published 2016“…The reason the AES encryption algorithm selected is because it is considered as one of the most secure encryption algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
9
Analysis of parabolic antennas for radio telescopes and the development of encryption methods for radio astronomical images
Published 2022“…The proposed algorithms include Development of Bit level Scrambling Encryption for Radio Telescope Imageries, Bit-levels Encryption for RGB Telescope Images, Bit-levels Encryption for RGB Telescope Images, Design of Encryption Algorithm in Combined Spatial and Frequency Domains for Telescope Grayscale and Bayer Images, and Combined Spatial and Frequency Domains in Algorithm of RGB Color Image Security for Telescope Images. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Selective video encryption algorithm based on H.264/AVC and AES
Published 2011Get full text
Get full text
Get full text
Book Chapter -
11
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Literature review and experiment aimed to select the fastest lightweight geo-encryption algorithms and the smallest ciphertext and key size. …”
Get full text
Get full text
Get full text
Academic Exercise -
12
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
Published 2012“…Even so, it parallels the evolution of these methods to penetrate systems. Researchers were developed this method for the protection of this algorithm. …”
Get full text
Get full text
Get full text
Thesis -
13
Database encryption for a Web-based Claims System
Published 2008“…Testing was also done on the encryption algorithms and Web browsers selected by increasing both the text length size and key length size and observed its performances. …”
Get full text
Thesis -
14
Clonal selection algorithm for the cryptanalysis of a simple substitution cipher
Published 2006“…The development of Clonal Selection Algorithm (CSA) is inspired by elements from clonal selection theories. …”
Get full text
Get full text
Conference or Workshop Item -
15
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…The Genetic Algorithm is an area in the field of Artificial Intelligence that is founded on the principles of biological evolution. …”
Get full text
Get full text
Thesis -
16
-
17
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…Differential evolution (DE) is a simple yet powerful evolutionary algorithm (EA). …”
Get full text
Get full text
Thesis -
18
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…The performance analysis in terms of processing speed of the encryption and decryption process of the DDBC algorithm shows minimal differences in both AES and DDBC algorithm despite of the difference method of transformation used in both algorithms. …”
Get full text
Get full text
Thesis -
19
Resource allocation in coordinated multipoint long term evolution-advanced networks
Published 2015“…The LRA algorithm is a three-step resource allocation scheme that consists of user selection module, subcarrier allocation module and power allocation module which are performed sequentially in a multi-antenna CoMP network. …”
Get full text
Get full text
Thesis -
20
An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography
Published 2011“…In this paper, we design a new selective video encryption based on H.264/AVC and AES. …”
Get full text
Get full text
Get full text
Article
