Search Results - data distribution ((based algorithm) OR (((encryption algorithm) OR (connection algorithm))))
Search alternatives:
-
1
-
2
Encryption method for SCADA security enhancement
Published 2014“…The proposed security solutions takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within distributed network protocol (DNP3) stack. …”
Get full text
Get full text
Get full text
Article -
3
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
Published 2017“…AES is a data encryption technique that exist in the world with as currently the most secured algorithms. …”
Get full text
Get full text
Thesis -
4
Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map
Published 2023“…Additionally, the Latin square matrix stands out for its uniform histogram distribution, thereby bolstering its encryption's potency. …”
Get full text
Get full text
Get full text
Article -
5
Chaos-based simultaneous compression and encryption for Hadoop
Published 2017“…Data compression and encryption are key components of commonly deployed platforms such as Hadoop. …”
Get full text
Get full text
Article -
6
Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks
Published 2015“…To generate, update and distribute the keys for secure communication over IEEE 802.16e, the MBS applies Multicast and Broadcast Rekeying Algorithm (MBRA) as a basic key management algorithm. …”
Get full text
Get full text
Thesis -
7
Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks
Published 2019“…Connectivity is a critical issue in WSNs, as the data collected needs to be sent to the base station or the processing centers. …”
Get full text
Get full text
Thesis -
8
A new secure storing system for biometric templates based encryption and concealment
Published 2015“…This study proposes a novel approach that combines an improved encryption method with a new concealment technique to establish a secure data template storing system. …”
Get full text
Get full text
Get full text
Article -
9
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…This paper shows the results of processing time of data encryption between asymmetric key algorithm (RSA) and symmetric key algorithm (AES) which includes its key-distribution processing time with client’s public key (RSA) from small to large amount of data. …”
Get full text
Get full text
Get full text
Proceeding Paper -
10
Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing
Published 2022“…The compression mechanism is performed using adaptive lossless compression based on Huffman encoding. Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
Get full text
Get full text
Get full text
Thesis -
11
Improve cloud computing security using RSA encryption with Fermat's little theorem
Published 2014“…It moves computing and data away from desktop and portable PCs into large data centers.CC is a Internet based computing, the entire data reside over a set of networked resources, this data can be accessed through virtual machines like i phone, PC etc.CC help to reduce hardware, maintenance and installation cost. …”
Get full text
Get full text
Get full text
Article -
12
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…This is useful for storing large amounts of data used in the cloud computing, the key distribution and authentication of the asymmetric encryption, speed, data integrity and data confidentiality of the symmetric encryption are also important also it enables to execute required computations on this encrypted data. � 2022 Institute of Advanced Engineering and Science. …”
Article -
13
Multicast-unicast key management and data delivery method in wireless IPv6 networks
Published 2012“…Whenever a new node is granted to join or leave a multicast group, a new key should be generated and distributed to every node in the network. Considering a highly dense environment where connection of users to the network is frequently changing due to join or leave operations, such approach may burden a network device with a huge amount of complex encryption and decryption process.While a number of algorithms has been proposed to address this issue, most of the existing approaches have to increase their encryption and decryption cycles in order to maintain the security level of the key management, thereby again suffering from high computation cost. …”
Get full text
Get full text
Thesis -
14
Density based subspace clustering: a case study on perception of the required skill
Published 2014“…This thesis proposed subspace clustering based on density connection, named DAta MIning subspace clusteRing Approach (DAMIRA), an improve of subspace clustering algorithm based on density connection. …”
Get full text
Get full text
Thesis -
15
Density subspace clustering: a case study on perception of the required skill
Published 2014“…This thesis proposed subspace clustering based on density connection, named DAta MIning subspace clusteRing Approach (DAMIRA), an improve of subspace clustering algorithm based on density connection. …”
Get full text
Get full text
Thesis -
16
Efficient k-coverage scheduling algorithms for wireless sensor networks / Ahmed Abdullah Saleh Al-Shalabi
Published 2014“…This research demonstrates distributed and energy-efficient k-coverage scheduling algorithms that preserve the required k-coverage and prolong the network lifetime. …”
Get full text
Get full text
Thesis -
17
High Impedance Fault Detection on Power Distribution Feeder
Published 2012“…The results show that the proposed algorithm can distinguish successfully HIFs from other events in distribution power system.…”
Get full text
Get full text
Get full text
Article -
18
Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment
Published 2024“…Electric power production data has the characteristics of massive data scale, high update frequency and fast growth rate. …”
Article -
19
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012“…The distribution of data will be based on the chosen percentages,which is entered by a sender.These percentages will be agreed between both the sender and the receiver as a key of hiding.The proposed system goal is to provide more complexity in encryption and make the embedding capacity as high as possible with high visible quality in a way that it does not allow any attacker to even detect that there are secret messages.The complexity of encryption and concealment was checked out with a number of widely used metrics such as Peak Signal to Noise Ratio(PSNR),Mean Squared Error(MSE), Normalized Absolute Error (NAE) and Normalized Correlation Coefficient (NCC).The experimental results demonstrate the complexity of the proposed method compared with the standard and existing methods.…”
Get full text
Get full text
Thesis -
20
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012“…The distribution of data will be based on the chosen percentages,which is entered by a sender.These percentages will be agreed between both the sender and the receiver as a key of hiding.The proposed system goal is to provide more complexity in encryption and make the embedding capacity as high as possible with high visible quality in a way that it does not allow any attacker to even detect that there are secret messages.The complexity of encryption and concealment was checked out with a number of widely used metrics such as Peak Signal to Noise Ratio(PSNR),Mean Squared Error(MSE), Normalized Absolute Error (NAE) and Normalized Correlation Coefficient (NCC).The experimental results demonstrate the complexity of the proposed method compared with the standard and existing methods.…”
Get full text
Get full text
Undergraduates Project Papers
