Search Results - (( data classification encryption algorithm ) OR ( java application stemming algorithm ))
Search alternatives:
- application stemming »
- data classification »
- stemming algorithm »
- java application »
-
1
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…This discovery suggests that selecting appropriated algorithms for data encryption in different ranges of data size affects processing time supporting Medical Emergency System.…”
Get full text
Get full text
Get full text
Proceeding Paper -
2
Data classification based on confidentiality in virtual cloud environment
Published 2014“…The K-Nearest Neighbour (K-NN) classifier is used for data classification and the Rivest, Shamir and Adelman (RSA) algorithm is used to encrypt sensitive data. …”
Get full text
Get full text
Article -
3
A survey of homomorphic encryption for outsourced big data
Published 2016“…Existing works on homomorphic encryption are technically reviewed and compared in terms of their encryption scheme, homomorphism classification, algorithm design, noise management, and security assumption. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
4
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…Then, hyperparameters of DNN must be tuned to get the best setting for a given problem, and it becomes crucial to evaluate them to verify whether the model can accurately categorize the data. Furthermore, conventional encryption methods such as Data Encryption Standards (DES) are not adapted to image data because of their high redundancy and big capacity. …”
Get full text
Get full text
Thesis -
5
K-NN classifier for data confidentiality in cloud computing
Published 2014“…The RSA algorithm is used to encrypt the sensitive data to keep it secure. …”
Get full text
Get full text
Conference or Workshop Item -
6
A Steganalysis Classification Algorithm Based on Distinctive Texture Features
Published 2023“…Image is one of the most essential media for concealing data, making it hard to identify hidden data not visible to the human eye. …”
Article -
7
Diagnosis security problems in cloud computing for business cloud
Published 2023“…Secondly , they prefer to develop the multi-key cipher algorithm in order to manage the encryption based on the level of security. � 2005 - 2016 JATIT & LLS. …”
Article
