Search Results - (( attack design process algorithm ) OR ( java implication force algorithm ))
Search alternatives:
- process algorithm »
- implication force »
- java implication »
- force algorithm »
- attack design »
-
1
Cryptanalysis in cryptographic algorithm design
Published 2006“…The structure of the cryptographic algorithms must be constructed carefully so that it is resilient against attacks. …”
Get full text
Conference or Workshop Item -
2
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…The performance analysis in terms of processing speed of the encryption and decryption process of the DDBC algorithm shows minimal differences in both AES and DDBC algorithm despite of the difference method of transformation used in both algorithms. …”
Get full text
Get full text
Thesis -
3
Message based random variable length key encryption algorithm.
Published 2009“…None fixed size key caused avoidance of replaying and other attacks that can happen on fixed sized key algorithms. …”
Get full text
Get full text
Article -
4
Design and analysis of an early heart attack detection using openCV
Published 2022Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Attacks detection in 6G wireless networks using machine learning
Published 2023“…The Attacks Detection in 6G (AD6Gs) wireless networks created by this research uses a Machine Learning (ML) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…Therefore, it can be concluded that the strength and validity of KSAHC algorithm have been enhanced as compared to other algorithms and can serve as the alternative algorithm in designing security systems.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Robust Image Zero- Watermarking Based on Complex Zernike Moment
Published 2014Get full text
Get full text
Conference or Workshop Item -
8
-
9
Image authentication using Zernike moment watermarking
Published 2013“…Experimental results showed that this algorithm achieves better bit error rate against JPEG compression, rotation, scale and noise attacks in comparison with other reviewed schemes in this work. …”
Get full text
Get full text
Thesis -
10
Robust Image Zero-Watermarking Based on Complex Zernike Moment
Published 2014Get full text
Get full text
Conference or Workshop Item -
11
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
12
Implementation of hashed cryptography algorithm based on cryptography message syntax
Published 2019“…The coding is designed in such a way that there is a malicious attack to destroy the data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Design and Implementation of Advanced Encryption Standard Using Verilog HDL
Published 2020“…The focus of this paper is to match with the existing cryptography algorithm, 128-bit Advanced Encryption Algorithm and improving the processing speed for the design with hardware implementation. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Distributed Denial-of-Service Defense System
Published 2006“…The scope of study will coverthe aspect of howthe attack detection algorithms work and identify the attack traffic, hence develop appropriate attack responses. …”
Get full text
Get full text
Final Year Project -
15
Trust based Lightweight Security Protocol for Device to Device Multihop Cellular Communication
Published 2020“…Formal and computational analysis of TLwS shows that it can mitigate replay attack, Man-in-the-Middle (MITM) attack, freshness attack, interleaving attack, and masquerading attack. …”
Get full text
Get full text
Thesis -
16
Improved message authentication technique on IEEE 802.15.4 wireless sensor network using multiple key protocol
Published 2014“…The study shows that the developed algorithms MKPAES and DMAC increase the performance of the WSN and improve the system resistance to attacks on the WSN. …”
Get full text
Get full text
Thesis -
17
Efficient dynamic DNA-based block cipher algorithm
Published 2023“…Ensuring sufficient non-linearity is a crucial factor in the design of S-Box. The use of non-linear S-Box is essential in preventing linear approximations that could lead to successful attacks, such as differential cryptanalysis. …”
Get full text
Get full text
Thesis -
18
User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Published 2023“…Moreover, the learning process of the proposed algorithm for behavior recognition designed as a matching factor with a password during the authentication process. …”
text::Thesis -
19
Design and implementation of advanced encryption standard using verilog HDL
Published 2022“…The focus of this paper is to match with the existing cryptography algorithm, 128-bit Advanced Encryption Algorithm and improving the processing speed for the design with hardware implementation. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
802.11 MAC layer sniffer using spoof detection algorithm / Azwan Abdul Satar
Published 2007“…This paper present a wireless sniffer monitoring tool, as well as the analysis and development process of constructing it. The goal is to design a wireless sniffer that can automatically detect spoofing and provide simple network statistic. …”
Get full text
Get full text
Thesis
