Search Results - (( based encryption tree algorithm ) OR ( java application matching algorithm ))
Search alternatives:
- application matching »
- java application »
- encryption tree »
- tree algorithm »
-
1
An efficient secure ECG compression based on 2D-SPIHT and SIT algorithm
Published 2017Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
-
3
Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks
Published 2015“…One of the trees is a binary tree data structure and the other is a B-tree data structure. …”
Get full text
Get full text
Thesis -
4
-
5
-
6
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
7
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
-
9
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis
