Search Results - (( construct security application algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- application algorithm »
- security application »
- java application »
- construct »
-
1
Post quantum signature schemes for the block chain technology
Published 2019Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
A new image encryption algorithm based on single S-box and dynamic encryption step
Published 2021“…The experimental results and security analysis show that the proposed scheme enjoys higher security and is more efficient to secure digital images in real-world applications.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Experiment -
3
-
4
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
Published 2004“…The objective of this research in primarily to find the best fit crytography system that can encrypt and decrypt the extension file .doc, implement it in a simple application which works similar to email and construct and run a set of evaluation to securing plaintext file in a web based environment. …”
Get full text
Get full text
Get full text
Thesis -
5
The Construction Of Quantum Block Cipher For Grover Algorithm
Published 2018Get full text
Get full text
Thesis -
6
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
7
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
8
-
9
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
10
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…Evaluations of algorithms reveal that the proposed algorithm has achieved a level of security and complexity that is 48 times superior to that of other methods that have been tried and tested. …”
Get full text
Get full text
Get full text
Thesis -
11
Development of DNA-based dynamic key-dependent block cipher
Published 2015Get full text
Get full text
Thesis -
12
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
13
Optimization of medical image steganography using n-decomposition genetic algorithm
Published 2023“…The Least Significant Bits (LSB) technique has been widely used for secure communication. However, it is susceptible to imperceptibility and security risks due to the direct manipulation of pixels, and ASCII patterns present limitations. …”
Get full text
Get full text
Get full text
Thesis -
14
HTS : a hierarchical method for load balancing in autonomous networks.
Published 2008Get full text
Get full text
Article -
15
Code-Based Signature Schemes For Online Voting System Based On The Blockchain Technology
Published 2022“…Last but not least, comprehensive security of the constructed protocol is provided and the protocol is secured under the CK model.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
-
17
-
18
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
Published 2019“…To investigate its performance in terms of security, a new chaos-based image encryption algorithm is also proposed. …”
Get full text
Get full text
Thesis -
19
Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri
Published 2017“…There are four phases involved which are inception, elaboration, construction and lastly, transition. As expected, the algorithm applied in this project is effective and can help users to increase their home security level. …”
Get full text
Get full text
Thesis -
20
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…Our approach is, therefore, highly effective and efficient, with the potential to be used in real-world network security applications.…”
Get full text
Get full text
Article
