Search Results - (( data certification encryption algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- certification encryption »
- data certification »
- implication based »
- java implication »
-
1
Digital Certificate-based Authentication Model For Enhanced Smartphone Security
Published 2025journal::journal article -
2
Digital certificate-based authentication model for enhanced smartphone security / A. H. Azni, Sakiinah Altaf Hussain and Najwa Hayaati Mohd Alwi
Published 2025“…Cryptography is pivotal in ensuring that only authorized devices can access data. This paper introduces an innovative authentication model for smartphones, integrating digital certificates and secret keys to securely encrypt and decrypt data. …”
Get full text
Get full text
Get full text
Article -
3
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
4
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…Fine-grained access control using Attribute-Based Encryption (ABE) mechanisms can be enforced as the first line of defense on the untrusted cloud to forbid unauthorized access to the stored data. …”
Get full text
Get full text
Thesis -
5
Flexible content authorization using digital rights management in cloud computing / Ali Hussain
Published 2021“…The integrity of data is verified with the use of HMAC algorithm chain using the verify function of versifier in Macaroon. …”
Get full text
Get full text
Get full text
Thesis -
6
A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm
Published 2024“…Least significant bits (LSB) were used by the techniques to encrypt authentication data. By dispersing the numbered original data as far away from the original locations as feasible, the strategies made use of specific numbering systems. …”
Get full text
Get full text
Thesis -
7
Reliable access control for mobile cloud computing (MCC) with cache-aware scheduling
Published 2019“…Although MCC brings many benefits to users and organizations, security has become the main concern for MCC because it involves third party environment where data confidentiality is not a guarantee. To overcome this challenge, attribute-based encryption (ABE) technique, a promising cryptography method was introduced to support both data confidentiality and access control simultaneously. …”
Get full text
Get full text
Get full text
Article -
8
Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure
Published 2022“…—The Transport Layer ensures that data is sent transparently between end-users while also enabling reliable data transfer services to the higher levels. …”
Get full text
Get full text
Get full text
Proceeding -
9
-
10
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis
