Search Results - (( based encryption utilizing algorithm ) OR ( java applications stemming algorithm ))
Search alternatives:
- applications stemming »
- encryption utilizing »
- stemming algorithm »
- java applications »
-
1
Image encryption algorithm based on chaotic mapping
Published 2003“…This paper discusses an alternative symmetric-key encryption algorithm for securing images, namely Secure Image Encryption (SIP) that is based on chaos. …”
Get full text
Get full text
Get full text
Article -
2
Encryption selection for WLAN IEEE802.11G
Published 2013“…The impact on throughput and time success can be examined based on encryption algorithms and encryption protocols by using this proposed mechanism. …”
Get full text
Get full text
Thesis -
3
Cryptanalysis and design of chaos based image encryption schemes
Published 2025“…Furthermore, we present a grayscale image encryption scheme utilizing a permutation-diffusion architecture, as well as a color image encryption scheme based on a genetic algorithm and the 2D-SHCM. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…The 2-dimensional hybrid cube is generated based on permutation and combination of integer numbers that are utilized in the construction of encryption and decryption key in the non-binary block cipher. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Serpent encryption algorithm implementation on Compute Unified Device Architecture (CUDA)
Published 2010“…We present a methodology for the transformation of CPU-based implementation of Serpent encryption algorithm (in C language) on CUDA to take advantage of CUDA’s parallel processing capability. …”
Get full text
Get full text
Conference or Workshop Item -
6
Serpent encryption algorithm implementation on Compute Unified Device Architecture (CUDA)
Published 2010“…We present a methodology for the transformation of CPU-based implementation of Serpent encryption algorithm (in C language) on CUDA to take advantage of CUDA’s parallel processing capability. …”
Get full text
Get full text
Conference or Workshop Item -
7
Secure Hybrid Scheme For Securing Mqtt Protocol Based On Enhanced Symmetric Algorithm
Published 2023“…The proposed cryptosystem utilized two algorithms: a dynamic variant of the Advanced Encryption Standard (D-AES) and Key policy attribute base encryption (KP-ABE). …”
Get full text
Get full text
Thesis -
8
CHAOS AND PUBLIC KEY INFRASTRUCTURE (PKI)
Published 2004“…The author of [1] has a published work entitled "Public-key Encryption Based on Chebyshev Maps" [2] and this is utilized as the core of a new public key encryption scheme. …”
Get full text
Get full text
Final Year Project -
9
A Chaos-Based Substitution Box (S-Box) Design with Improved Differential Approximation Probability (DP)
Published 2018“…Therefore, this paper reports a systematic design methodology to generate chaotic S-box utilizing DDT and that can be used in multimedia encryption algorithms. …”
Get full text
Get full text
Article -
10
A Chaos-Based Substitution Box (S-Box) Design with Improved Differential Approximation Probability (DP)
Published 2018“…Therefore, this paper reports a systematic design methodology to generate chaotic S-box utilizing DDT and that can be used in multimedia encryption algorithms. …”
Get full text
Get full text
Article -
11
Key generation technique based on triangular coordinate extraction for hybrid cubes
Published 2017“…The generation of Hybrid Cubes (HC) based on permutation and combination of integer numbers are utilized in the construction of encryption and decryption key in the non-binary block cipher. …”
Get full text
Get full text
Article -
12
Performance analysis and improvement of rabin primitive based cryptosystems
Published 2014“…Finally, we amend the Rabin cryptosystem utilizing the encryption strategy of the AAβ algorithm and run experiments to gauge its efficiency.…”
Get full text
Get full text
Get full text
Thesis -
13
Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing
Published 2022“…The compression mechanism is performed using adaptive lossless compression based on Huffman encoding. Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
Published 2022“…This thesis proposes a TLS-based malware detection (TLSMalDetect) approach based on ML classification to address flow feature utilization limitations in related work. …”
Get full text
Get full text
Thesis -
15
Fast decryption method for a Rabin primitive-based cryptosystem
Published 2014“…It seems that its current decryption algorithm is significantly slower than its encryption process. …”
Get full text
Get full text
Get full text
Article -
16
Two-Phases QR Authentication Algorithm (2PQRA) for Digital Energy and IoT Applications
Published 2023Conference Paper -
17
Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA
Published 2013“…For an effective storage encryption implementation, two well known methods are software based encryption and hardware based encryption. …”
Get full text
Get full text
Thesis -
18
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003“…More specifically, these include encryption, decryption, authentication, digital signature algorithms and message-digest functions. …”
Get full text
Get full text
Thesis -
19
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
Get full text
Get full text
Thesis -
20
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…The experiment showed that, for P2P identification ability, Netflow based algorithm detected 28.7% more than DPI. Further investigation clearly showed it was because DPI failed to detect encrypted P2P hosts compared to DPI. …”
Get full text
Get full text
Thesis
