Search Results - (( based information security algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Research on the security algorithm of reversible information hiding in communication encrypted image by Jijun, Wang, Soo, Fun Tan, Yi, Yuan

    Published 2021
    “…Considering the embedding capacity and the security of the algorithm, the paper proposes a reversible information hiding algorithm for encrypted images based on. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  4. 4

    A review on the graphical user authentication algorithm : recognition-based and recall-based. by Ugochukwu, Ejike Ekeke Kingsley, Jusoh, Yusmadi Yah

    Published 2013
    “…User authentication has become an important consideration in information security as traditional password-based schemes are constantly subjected to attacks. …”
    Get full text
    Get full text
    Article
  5. 5

    Implementation of AES algorithm into information investigation autopsy (IIA) / Ahmad Wafiy Hamad Zaki by Hamad Zaki, Ahmad Wafiy Hamad Zaki

    Published 2013
    “…The objectives of this project are to apply the encryption algorithm into these tools for securing the information collected by keystroke logging mechanism. …”
    Get full text
    Get full text
    Student Project
  6. 6

    New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2012
    “…Mobile information security should be enhanced to new scheme that more simple and use the small key size, also high security level. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Enhancing speed performance of the cryptographic algorithm based on the lucas sequence by M. Abulkhirat, Esam

    Published 2003
    “…Computer information and network security has recently become a popular subject due to the explosive growth of the Internet and the migration of commerce practices to the electronic medium. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Symmetric Key Size for Different Level of Information Classification by Ibrahim, Subariah, Maarof, Mohd. Aizaini

    Published 2006
    “…The classification depends on the level of damage to an organization or to national security when the information is disclosed. Therefore confidential information is normally protected by using cryptographic algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection by Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…Many past studies proposed fingerprint template protection (FTP) using chaotic-based encryption algorithms that are more suitable to secure images than conventional encryption such as DES, AES, and RSA. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Dynamic S-boxes and spiral permutation function on Fibonacci sequence for secure block cipher / Kamsiah Mohamed by Mohamed, Kamsiah

    Published 2022
    “…Cryptography requires a secure technique to ensure that the enemy is prevented while securing legitimate users gaining access to information. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    A new algorithm on Graphical User Authentication (GUA) based on multi-line grids by Lashkari, Arash Habibi, Gani, Abdullah, Sabet, Leila Ghasemi, Farmand, Samaneh

    Published 2010
    “…Thereafter a comparative analysis of all Recall-Based algorithms based on attack patterns of graphical user authentication is tabulated. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    Two-Phases QR Authentication Algorithm (2PQRA) for Digital Energy and IoT Applications by Al-Ghaili A.M., Kasim H., Omar R., Al-Hada N.M., Hassan Z., Hussain T.J., Othman M.

    Published 2023
    “…Automation; Codes (symbols); Cryptography; Internet of things; Authentication algorithm; Energy; Internet-based medias; Private information; Quick response code; Quick response code code; Security level; Simple++; Smart homes; Two phase; Authentication…”
    Conference Paper
  18. 18
  19. 19

    Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm by Mohammed Alaidaros, Hashem

    Published 2007
    “…Based on the performance simulations, the new parallel algorithm gained speedup of 1.74 with 85% efficiency over the current sequential algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Lattice-based cryptography: the dots that provide information security by Arif Mandangan, Hailiza Kamarulhaili, Muhammad Asyraf Asbullah, Che Haziqah Che Hussin

    Published 2023
    “…Alternatively, most of the current cryptographic schemes are developed based on hard mathematical problems believed to be as unaffected by Shor’s quantum algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings