Search Results - data distribution ((encryption algorithm) OR (((conversion algorithm) OR (control algorithm))))
Search alternatives:
- conversion algorithm »
- data distribution »
-
1
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
Published 2017“…AES is a data encryption technique that exist in the world with as currently the most secured algorithms. …”
Get full text
Get full text
Thesis -
2
Prospective Control Systems and Cyber-Securities for Electrical Secondary Substations
Published 2023Conference Paper -
3
Encryption method for SCADA security enhancement
Published 2014“…Wide Area Networks (WAN)" or/and over internet to fulfill the requiremenets of industrial processing and automation. Supervisory Control and Data Acquisition (SCADA) system is part of ICS. …”
Get full text
Get full text
Get full text
Article -
4
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…This paper shows the results of processing time of data encryption between asymmetric key algorithm (RSA) and symmetric key algorithm (AES) which includes its key-distribution processing time with client’s public key (RSA) from small to large amount of data. …”
Get full text
Get full text
Get full text
Proceeding Paper -
5
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…This is useful for storing large amounts of data used in the cloud computing, the key distribution and authentication of the asymmetric encryption, speed, data integrity and data confidentiality of the symmetric encryption are also important also it enables to execute required computations on this encrypted data. � 2022 Institute of Advanced Engineering and Science. …”
Article -
6
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
7
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
8
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…Some schemes have been proposed to deliver such access control using Ciphertext-policy attribute-based encryption (CP-ABE) that can enforce data owners’ access policies to achieve such cryptographic access control and tackle the majority of those concerns. …”
Get full text
Get full text
Thesis -
9
The implementation of fault management in distribution system using distribution automation system (DAS) in conjunction with SCADA
Published 2012“…The operation of controlling and monitoring of electrical power activity or condition in distribution side, typically take at the distribution substation system. …”
Get full text
Get full text
Conference or Workshop Item -
10
Flexible content authorization using digital rights management in cloud computing / Ali Hussain
Published 2021“…The integrity of data is verified with the use of HMAC algorithm chain using the verify function of versifier in Macaroon. …”
Get full text
Get full text
Get full text
Thesis -
11
Chaos-based simultaneous compression and encryption for Hadoop
Published 2017“…Data compression and encryption are key components of commonly deployed platforms such as Hadoop. …”
Get full text
Get full text
Article -
12
-
13
Secure lightweight client for cloud-based E-Health Model
Published 2023“…This algorithm verifies the identity and permission of non-group members to meet the strict privacy protection requirements of EHRs data. …”
Get full text
Get full text
Get full text
Thesis -
14
Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map
Published 2023“…Additionally, the Latin square matrix stands out for its uniform histogram distribution, thereby bolstering its encryption's potency. …”
Get full text
Get full text
Get full text
Article -
15
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
Published 2019“…Furthermore, the attacks are detected and prevented by utilizing secure node authentication, data fragmentation algorithms, fully homomorphic encryption, and access control model. …”
Get full text
Get full text
Article -
16
Secured HF image transmission system
Published 2006“…The system is built around an HF data communication system: HF transceiver, modem, controller and computer. …”
Get full text
Get full text
Monograph -
17
Security in robot operating system (ROS) by using Advanced Encryption Standard (AES)
Published 2018“…In particular, this research focuses on using encryption algorithm which is AES. The encryption algorithm will be evaluated according to the performance of the system, both from computing and communications point of view.…”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
18
DC-based PV-powered home energy system
Published 2017“…A controller based on an algorithm of one time maximum power point (MPP) is proposed to mitigate those losses. …”
Get full text
Get full text
Thesis -
19
An overview: Theoretical and mathematical perspectives for advance Encryption standard/Rijndael
Published 2010“…With the quick development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, also the internet allows for wide distribution of digital media data. …”
Get full text
Get full text
Article -
20
Improve cloud computing security using RSA encryption with Fermat's little theorem
Published 2014“…It moves computing and data away from desktop and portable PCs into large data centers.CC is a Internet based computing, the entire data reside over a set of networked resources, this data can be accessed through virtual machines like i phone, PC etc.CC help to reduce hardware, maintenance and installation cost. …”
Get full text
Get full text
Get full text
Article
