Search Results - (( data distribution encryption algorithm ) OR ( data distribution selection algorithm ))

Refine Results
  1. 1

    Privacy in medical emergency system: cryptographic and security aspects by Hameed, Shihab A., Yuchoch, Habib, Al-Khateeb, Wajdi Fawzi Mohammed

    Published 2010
    “…This paper shows the results of processing time of data encryption between asymmetric key algorithm (RSA) and symmetric key algorithm (AES) which includes its key-distribution processing time with client’s public key (RSA) from small to large amount of data. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    A new secure storing system for biometric templates based encryption and concealment by Khalaf, Emad Taha, Norrozila, Sulaiman

    Published 2015
    “…The Hill Cipher algorithm has been improved to be more secure by using a large and random key with large data block and also extending it to include the special characters. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Enhancement of cryptography and transform domain in steganography for higher embedding capacity by Khalaf, Emad T

    Published 2012
    “…In the field of Data Communication, security issues are the top priority.Cryptography and steganography address the necessary elements for secure communication namely privacy, confidentiality,key exchange,authentication,and non-repudiation but reveals the fact that communication is happening.This study proposes a combination of Steganography and Cryptography to enhance security of the transmitted information.Hence this work is composed of two parts:cryptographic and steganographic.In the cryptographic part,an improvement has been proposed to the Hill cipher algorithm to be more secured by using a large and random key with large data block,and also extending it by including the special characters and digits.For the steganographic part,a new method has been proposed by combining Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT),to take the advantageous of both algorithms.The original image is decomposed into four bands using the Haar wavelet LL,HL,LH and HH.Three of these sub-bands have been selected to hiding data (LH,HL and HH)which are less effect to the image than LL sub-band.Then,DCT transform is applied to the selected DWT sub-band,the process of hiding will be in the least significant bit of the DCT coefficients to each sub-band. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Enhancement of cryptography and transform domain in steganography for higher embedding capacity by Khalaf, Emad T

    Published 2012
    “…In the field of Data Communication, security issues are the top priority.Cryptography and steganography address the necessary elements for secure communication namely privacy, confidentiality,key exchange,authentication,and non-repudiation but reveals the fact that communication is happening.This study proposes a combination of Steganography and Cryptography to enhance security of the transmitted information.Hence this work is composed of two parts:cryptographic and steganographic.In the cryptographic part,an improvement has been proposed to the Hill cipher algorithm to be more secured by using a large and random key with large data block,and also extending it by including the special characters and digits.For the steganographic part,a new method has been proposed by combining Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT),to take the advantageous of both algorithms.The original image is decomposed into four bands using the Haar wavelet LL,HL,LH and HH.Three of these sub-bands have been selected to hiding data (LH,HL and HH)which are less effect to the image than LL sub-band.Then,DCT transform is applied to the selected DWT sub-band,the process of hiding will be in the least significant bit of the DCT coefficients to each sub-band. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5

    Secured HF image transmission system by Shameri, Ahmad Zuri

    Published 2006
    “…Experiments were performed for data transmission over the HF spectrum at lower power of 5 to 25 watts on the 40 meter band (7.0 to 7.1 MHz) and marine band (8.0 to 8.8 MHz) for selected links within the Peninsular Malaysia. …”
    Get full text
    Get full text
    Monograph
  6. 6

    Diagnosis security problems in cloud computing for business cloud by Shakir M., Abubakar A.B., Yousoff Y.B., Sagher A.M., Alkayali H.

    Published 2023
    “…This study was carried out by distributing questionnaires to different organizations in selected twelve (12) countries. …”
    Article
  7. 7

    Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari by Nazari, Khairul Nashran

    Published 2017
    “…AES is a data encryption technique that exist in the world with as currently the most secured algorithms. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen by Shawkat S.A., Tuama B.A., Al-Barazanchi I.

    Published 2023
    “…This is useful for storing large amounts of data used in the cloud computing, the key distribution and authentication of the asymmetric encryption, speed, data integrity and data confidentiality of the symmetric encryption are also important also it enables to execute required computations on this encrypted data. � 2022 Institute of Advanced Engineering and Science. …”
    Article
  9. 9

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Chaos-based simultaneous compression and encryption for Hadoop by Usama, M., Zakaria, N.

    Published 2017
    “…Data compression and encryption are key components of commonly deployed platforms such as Hadoop. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    Security in robot operating system (ROS) by using Advanced Encryption Standard (AES) by Nor Alia Syuhada, Shaharudin

    Published 2018
    “…In particular, this research focuses on using encryption algorithm which is AES. The encryption algorithm will be evaluated according to the performance of the system, both from computing and communications point of view.…”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15

    An overview: Theoretical and mathematical perspectives for advance Encryption standard/Rijndael by Zaidan, A.A., Zaidan, B.B., Al-Frajat, Ali K., Jalab, Hamid Abdullah

    Published 2010
    “…With the quick development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, also the internet allows for wide distribution of digital media data. …”
    Get full text
    Get full text
    Article
  16. 16

    Improve cloud computing security using RSA encryption with Fermat's little theorem by Mohamed Shereek, Balkees, Muda, Zaiton, Yasin, Sharifah

    Published 2014
    “…It moves computing and data away from desktop and portable PCs into large data centers.CC is a Internet based computing, the entire data reside over a set of networked resources, this data can be accessed through virtual machines like i phone, PC etc.CC help to reduce hardware, maintenance and installation cost. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing by Hameed, Mustafa Emad

    Published 2022
    “…Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Secured route optimization in mobile IPv6 wireless networks in terms of data integrity by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm at a cost of a small increase in delay. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Feasibility of quantum cryptography with AES for secure communication by Mustaffa, Nurul Muzfirah, Mat Daud, Nurulain Balqis, Sase, Takumi

    Published 2026
    “…To address this, new quantum-resistant security methods are needed to protect private data and communications. This paper proposes a hybrid encryption approach that integrates quantum key distribution (QKD) with a simplified 3×3 advanced encryption standard (AES) key matrix, creating a lightweight system. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20