Search Results - ((((iteration algorithms) OR (encryption algorithm))) OR (detection algorithm))
Search alternatives:
- iteration algorithms »
-
1
DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE
Published 2019“…This project used iterative method to investigate the security algorithm and implemented the algorithm. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
2
Enhanced chaotic image encryption algorithm based on Baker's map
Published 2003“…This paper discusses an alternative chaotic image encryption based on Baker’s map. This enhanced symmetric-key algorithm can support a variable-size image as opposed to the algorithm which is mainly based on Baker’s map that requires only square image for encryption. …”
Get full text
Get full text
Article -
3
DESIGN AND IMPLEMENTATION OF RIPEMD-160 HASH FUNCTION USING VERILOG HDL
Published 2022“…This security algorithm was examined and put into use in this project using an iterative methodology. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
4
An improved chaotic image encryption algorithm
Published 2018“…Chaotic-based image encryption algorithms are countless in number. Encryption techniques based on Chaos are among the most effectual algorithms for encryption of data image. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
Features selection for IDS in encrypted traffic using genetic algorithm
Published 2013“…An encrypted malicious traffic is able to evade the detection by IDS. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A new public key cryptosystem based on IFS
Published 2010“…In the proposed public-key encryption algorithm, generate iterated function systems as a global public element, then its Hutchinson operator is used as a public key. …”
Get full text
Get full text
Get full text
Article -
7
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
Published 2017“…AES is the next generation encryption algorithm replacing the older version which is DES and Triple DES. …”
Get full text
Get full text
Thesis -
8
Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment
Published 2024“…This paper presents the design, simulation, and performance measurement of Simon encryption algorithm in IoT environment. Simon algorithm is a lightweight encryption algorithm which suitable for resource constraint environment like IoT devices. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
Features selection for ids in encrypted traffic using genetic algorithm
Published 2013“…An encrypted malicious traffic is able to evade the detection by IDS. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan
Published 2014“…El-gamal encryption system is an asymmetric key encryption algorithm which is based on the Diffie-Hellman key exchange. …”
Get full text
Get full text
Thesis -
11
Reconstructing applicable chaotic Baptista-type symmetric cryptosystem
Published 2014“…This recommended encryption algorithm also overcomes the flaw in Ariffin’s encryption procedure. …”
Get full text
Get full text
Get full text
Thesis -
12
Iterative data detection and channel estimation for single-parity check-product coded MIMO wireless communications system
Published 2005“…In iterative data-detection and channel-estimation algorithms, the channel estimator and the data detector recursively exchange the information order to improve the system performance. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Performance of iterative data detection and channel estimation for single-parity check-product coded multiple antenna wireless communications
Published 2005“…In iterative data-detection and channel-estimation algorithms, the channel estimator and the data detector recursively exchange the information order to improve the system performance. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
An enhanced Blowfish Algorithm based on cylindrical coordinate system and dynamic permutation box
Published 2014“…The Blowfish Algorithm (BA) is a symmetric block cipher that uses Feistel network to iterate simple encryption and decryption functions. …”
Get full text
Get full text
Get full text
Thesis -
15
Investigation of data encryption algorithm for secured transmission of electrocardiograph (ECG) signal
Published 2018“…This problem will be solved by encrypting the signals, using the proposed fully homomorphic encryption (FHE) technique. …”
Get full text
Get full text
Conference or Workshop Item -
16
Web-Application for securing message using Steganography with LSB Algorithm and Hybrid Encryption / Muhammad Khairul Amin Mohd Nai and Siti Rahayu Abdul Aziz
Published 2021Subjects: “…Algorithms…”
Get full text
Get full text
Get full text
Book Section -
17
Web-Application for securing message using Steganography with LSB Algorithm and Hybrid Encryption / Muhammad Khairul Amin Mohd Nai and Siti Rahayu Abdul Aziz
Published 2021Subjects: “…Algorithms…”
Get full text
Get full text
Get full text
Book Section -
18
Design and Implementation of MDS Hash Function Algorithm Using Verilog HDL
Published 2020“…In result, various encryption algorithms coming into being. Cryptographic algorithm has become one of the most essential features of embedded system design. …”
Get full text
Get full text
Get full text
Article -
19
Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys
Published 2016Subjects: Get full text
Get full text
Get full text
Thesis -
20
Recent Efficient Iterative Algorithms on Cognitive Radio Cooperative Spectrum Sensing to Improve Reliability and Performance
Published 2016“…This paper focuses on optimality of analytical study on the common soft decision fusion (SDF) CSS based on different iterative algorithms which confirm low total probability of error and high probability of detection in detail. …”
Get full text
Get full text
Article
