Search Results - (( basic evaluating technology algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2

    Analysis randomness properties of basic components of SNOW 3G cipher in mobile systems by Jassim, Khalid Fadhil, Alshaikhli, Imad Fakhri Taha

    Published 2016
    “…SNOW 3G is a stream cipher algorithm used as encryption algorithm in third generation mobile phone technology (3G-UMTS). …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming by Hussien, Hassan Mansur, Md Yasin, Sharifah, Muda, Zaiton, Udzir, Nur Izura

    Published 2019
    “…Block cipher algorithms become an essential domain in Information Technology (IT) due to ever increasing the number of attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    T-way testing : a test case generator based on melody search algorithm by Toh, Shu Yuen

    Published 2015
    “…Next, TTT-MS will be executed through main algorithms to generate Parameters Interaction List, Parameter Values Interaction List, and finally generate final Test Cases based on Melody Search Algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12
  13. 13

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…The tool is used to evaluate the accuracy of the proposed extraction algorithm to extract the appropriate information which are needed. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20