Search Results - (( developing innovative encryption algorithm ) OR ( java evolution optimization algorithm ))

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…The aim of this evolution is to reflect the unseen time overhead incurred by optimal real-time algorithm, represented by LRE-TL, which might hinder the claimed optimality of such algorithms when they are practically implemented. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3
  4. 4

    Secured electrocardiograph (ECG) signal using fully homomorphic encryption technique by Shaikh, Muhammad Umair, Ahmad, Siti Anom, Wan Adnan, Wan Azizun

    Published 2020
    “…The proposed encryption scheme FHE is performed on the encrypted ECG data where FHE can be applied in any system by using a various public key algorithm. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    A new 128-bit block cipher by Mohd Ali, Fakariah Hani

    Published 2009
    “…Every country has different requirements when requesting block cipher so there is no limit in developing them. According to the National IT Council (NlTC) report on "Securing Malaysia Sovereignty in the CyberWorld" provided by Ministry of Science, Technology and Innovation, Malaysia, they have outlined critical areas in which new and additional research and development is needed to increase the protection of the national information infrastructure. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10
  11. 11