Search Results - (( based information security algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- based information »
- java application »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Designing New Block Cipher Based On Genetic Algorithm Approach
Published 2024“…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
Article -
3
A block cipher based on genetic algorithm
Published 2016“…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
Get full text
Get full text
Get full text
Thesis -
4
Research on the security algorithm of reversible information hiding in communication encrypted image
Published 2021“…Considering the embedding capacity and the security of the algorithm, the paper proposes a reversible information hiding algorithm for encrypted images based on. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
5
A review on the graphical user authentication algorithm : recognition-based and recall-based.
Published 2013“…User authentication has become an important consideration in information security as traditional password-based schemes are constantly subjected to attacks. …”
Get full text
Get full text
Article -
6
Implementation of AES algorithm into information investigation autopsy (IIA) / Ahmad Wafiy Hamad Zaki
Published 2013“…The objectives of this project are to apply the encryption algorithm into these tools for securing the information collected by keystroke logging mechanism. …”
Get full text
Get full text
Student Project -
7
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Mobile information security should be enhanced to new scheme that more simple and use the small key size, also high security level. …”
Get full text
Get full text
Conference or Workshop Item -
8
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003“…Computer information and network security has recently become a popular subject due to the explosive growth of the Internet and the migration of commerce practices to the electronic medium. …”
Get full text
Get full text
Thesis -
9
Symmetric Key Size for Different Level of Information Classification
Published 2006“…The classification depends on the level of damage to an organization or to national security when the information is disclosed. Therefore confidential information is normally protected by using cryptographic algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
10
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…Many past studies proposed fingerprint template protection (FTP) using chaotic-based encryption algorithms that are more suitable to secure images than conventional encryption such as DES, AES, and RSA. …”
Get full text
Get full text
Get full text
Article -
11
Dynamic S-boxes and spiral permutation function on Fibonacci sequence for secure block cipher / Kamsiah Mohamed
Published 2022“…Cryptography requires a secure technique to ensure that the enemy is prevented while securing legitimate users gaining access to information. …”
Get full text
Get full text
Thesis -
12
-
13
A new algorithm on Graphical User Authentication (GUA) based on multi-line grids
Published 2010“…Thereafter a comparative analysis of all Recall-Based algorithms based on attack patterns of graphical user authentication is tabulated. …”
Get full text
Get full text
Get full text
Article -
14
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
15
Systematic literature review: Trend analysis on the design of lightweight block cipher
Published 2024journal::journal article -
16
An efficient secure ECG compression based on 2D-SPIHT and SIT algorithm
Published 2017Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
-
18
Two-Phases QR Authentication Algorithm (2PQRA) for Digital Energy and IoT Applications
Published 2023“…Automation; Codes (symbols); Cryptography; Internet of things; Authentication algorithm; Energy; Internet-based medias; Private information; Quick response code; Quick response code code; Security level; Simple++; Smart homes; Two phase; Authentication…”
Conference Paper -
19
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Based on the performance simulations, the new parallel algorithm gained speedup of 1.74 with 85% efficiency over the current sequential algorithm. …”
Get full text
Get full text
Thesis
