Search Results - (( adaptive a difference encryption algorithm ) OR ( adaptive _ difference pollination algorithm ))
Search alternatives:
- pollination algorithm »
- a difference »
- adaptive a »
-
1
-
2
Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm
Published 2024journal::journal article -
3
A modified flower pollination algorithm and carnivorous plant algorithm for solving engineering optimization problem
Published 2021“…Flower pollination algorithm (FPA) is a biomimicry optimisation algorithm inspired by natural pollination. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
A new cryptosystem analogous to LUCELG and Cramer-Shoup
Published 2009“…Based on LUCELG and Cramer-Shoup cryptosystems, a new public key cryptosystem is developed by generating the key generation, encryption and decryption algorithm. …”
Get full text
Get full text
Get full text
Article -
5
Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing
Published 2022“…Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
-
7
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
Get full text
Get full text
Get full text
Thesis -
8
-
9
A Hybrid Artificial Intelligence Model for Detecting Keratoconus
Published 2023“…This paper proposes a new unsupervised model to detect KCN, based on adapted flower pollination algorithm (FPA) and the k-means algorithm. …”
Article -
10
A Decentralized Multi-Factor User Authentication Scheme For The Internet Of Things System
Published 2024“…An enhanced PRESENT encryption and an Elliptic-Curve Cryptography algorithm were adapted to achieve a lightweight authentication scheme, a necessity of the resource-constraint devices. …”
Get full text
Get full text
Get full text
Get full text
Thesis
