Search Results - (( developing interactive encryption algorithm ) OR ( java internalization based algorithm ))
Search alternatives:
- developing interactive »
- internalization based »
- java internalization »
-
1
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…In order to more effectively incorporate both present technology and developing technology, models of DNA cryptography need to be developed. …”
Get full text
Get full text
Get full text
Thesis -
2
Selective video encryption algorithm based on H.264/AVC and AES
Published 2011Get full text
Get full text
Get full text
Book Chapter -
3
Café Web Based System Using Priority Scheduling Approach
Published 2017Get full text
Get full text
Conference or Workshop Item -
4
Secure block cipher inspired by the human immune system
Published 2012“…Symmetric encryption block cipher is an important cryptographic algorithm and the quest of enhancing data security is crucial due to the heavy usage of internet and mobile devices worldwide. …”
Get full text
Get full text
Thesis -
5
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
6
-
7
-
8
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014Get full text
Get full text
Conference or Workshop Item -
9
Text steganalysis using evolution algorithm approach
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
10
A random search based effective algorithm for pairwise test data generation
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015Get full text
Get full text
Conference or Workshop Item -
12
-
13
Teaching and learning via chatbots with immersive and machine learning capabilities
Published 2019Get full text
Get full text
Conference or Workshop Item -
14
Proposed method for enhancing quantum bit error rate using quantum key distribution technique
Published 2014“…The main issue is, the public key algorithm suffers no effective solutions which are natural within particular integer factorization, distinct logarithm and also elliptic curve interactions. …”
Get full text
Get full text
Conference or Workshop Item -
15
A method for group formation using genetic algorithm
Published 2010Get full text
Get full text
Get full text
Article -
16
-
17
EasyA: Easy and effective way to generate pairwise test data
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Mobile Vision-based Automatic Counting of Bacteria Colonies
Published 2017Get full text
Get full text
Get full text
Article -
19
Mining association rules from structured XML data
Published 2009Get full text
Get full text
Conference or Workshop Item -
20
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item
