Search Results - (( data features encryption algorithm ) OR ( java implementation phase algorithm ))
Search alternatives:
- implementation phase »
- features encryption »
- java implementation »
- phase algorithm »
- data features »
-
1
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…Performance evaluation shows that XTS exhibits faster speed when an RC6 encryption algorithm is used, compared to other encryption algorithms such as AES and Twofish. …”
Get full text
Get full text
Thesis -
2
Features selection for IDS in encrypted traffic using genetic algorithm
Published 2013“…On the other hand, encrypted exchanges between users are widely used to ensure data security. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Features selection for ids in encrypted traffic using genetic algorithm
Published 2013“…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Image Encrytion Using Block Based Transformation Algorithm
Published 2008“…Most of the available encryption algorithms are mainly used for textual data and may not be suitable for multimedia data such as images. …”
Get full text
Get full text
Get full text
Article -
5
Conceptual framework for lightweight ciphertext policy-attribute based encryption scheme for internet of things devices / Norhidayah Muhammad and Jasni Mohamad Zain
Published 2019“…CP-ABE algorithm is one-to-many technique suitable for secure grouping communication, but this algorithm is not a lightweight feature. …”
Get full text
Get full text
Get full text
Article -
6
Investigation of data encryption algorithm for secured transmission of electrocardiograph (ECG) signal
Published 2018“…The security and privacy features of the system protect the authenticity and confidentiality of the patient's medical data and are implemented using security enhancing techniques. …”
Get full text
Get full text
Conference or Workshop Item -
7
Towards virtuous cloud data storage using access policy hiding in ciphertext policy attribute-based encryption
Published 2021“…Cloud encryption is being employed to control data access while securing Cloud data. …”
Get full text
Get full text
Article -
8
Analysis of avalanche effect on advance encryption standard by using dynamic S-Box depends on rounds keys
Published 2014“…The aim of this paper is to design dynamic S-Box which depends on rounds keys for encryption in AES-128. The parameters of the dynamic S-Box have features equivalent to those in the normal algorithm AES. …”
Get full text
Get full text
Conference or Workshop Item -
9
Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm
Published 2024journal::journal article -
10
Attribute-based encryption in securing big data from post-quantum perspective: A survey
Published 2022“…Due to its fine-grained features, the ABE scheme is a protection layer in securing users’ data and privacy in big data processing and analytics. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
-
12
Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT
Published 2024journal::journal article -
13
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
14
-
15
A new secure storing system for biometric templates based encryption and concealment
Published 2015“…This study proposes a novel approach that combines an improved encryption method with a new concealment technique to establish a secure data template storing system. …”
Get full text
Get full text
Get full text
Article -
16
Packet header support using hybrid security approach for securing trivial file transfer protocol in machine to machine applications / Nur Nabila Mohamed
Published 2019“…The security flaw should not be ignored as the attackers can easily access, modify private information and install malicious codes to interrupt the communication especially during data collection and transmission. Here in this thesis study, a feasible hybrid security extension has been incorporated into the protocol combining the Hash-based Message Authentication Code and Diffie Hellman Key Exchange (HMAC-DHKE) to enable key agreement and Advanced Encryption Standard (AES) algorithm to perform data encryption/decryption. …”
Get full text
Get full text
Thesis -
17
Database encryption for a Web-based Claims System
Published 2008“…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
Get full text
Thesis -
18
An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography
Published 2011“…This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
Get full text
Get full text
Get full text
Article -
19
An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): selective cryptography
Published 2011“…This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
Get full text
Get full text
Get full text
Article -
20
RENTAKA: A novel machine learning framework for crypto-ransomware pre-encryption detection
Published 2022“…It spreads through phishing emails, encrypting sensitive data, and causing harm to the designated client. …”
Get full text
Get full text
Get full text
Article
