Search Results - (( developing key based algorithm ) OR ( java validation using algorithm ))
Search alternatives:
- validation using »
- java validation »
- using algorithm »
- developing key »
- key based »
-
1
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…This research employed a modified version of the Design Science Research Methodology (DSRM), streamlined into five stages: problem identification, theoretical study, framework development, evaluation, and reporting. The developed framework, grounded in fault-based testing theory, comprises three key components: inputs, prioritization factors, and a prioritization algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
3
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…This work presents a systematic approach for capturing tacit knowledge to be used in a business intelligence framework. The approach is based on the theory of systematic functional linguistics, developed into interview protocols to be asked to tacit knowledge owners. …”
Get full text
Get full text
Thesis -
4
Enhance key generation algorithm based user string identity as public key
Published 2015“…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
Get full text
Get full text
Thesis -
5
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…This research proposed a new Key Schedule Algorithm based on the coordinate geometry of a Hybrid Cube (KSAHC) for the non-binary block cipher. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
7
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
8
A hybrid database encryption algorithm based on reverse string and dynamic key
Published 2016Get full text
Get full text
Conference or Workshop Item -
9
A block cipher based on genetic algorithm
Published 2016“…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
Get full text
Get full text
Get full text
Thesis -
10
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
11
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
Published 2012“…The system depends on the base "If you enter a true key, you obtain to the truth information, but if you enter the false key; you obtains to the false information."…”
Get full text
Get full text
Get full text
Thesis -
12
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Thus, it is suitable for mobile devices, it uses 160 bits key and provides the same security as RSA 1024 bits key.Some benefits are expected from this study to improve the encryption algorithm for mobile security.…”
Get full text
Get full text
Conference or Workshop Item -
13
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
14
Development of DNA-based dynamic key-dependent block cipher
Published 2015“…The DNAB utilizes the DNA-based key-dependent components to enhance the security of cipher, and reduce the number of cipher-iterated rounds. …”
Get full text
Get full text
Thesis -
15
Statistical fixed range multiple selection algorithm for peer-to-peer system
Published 2010“…This algorithm is developed based on the statistical knowledge about the uniform distribution nature of the data which has been arranged in ascending order in the local file. …”
Get full text
Get full text
Conference or Workshop Item -
16
Static range multiple selection algorithm for peer-to-peer system
Published 2011“…This algorithm is developed based on the statistical knowledge about the uniform distribution nature of the data which has been arranged according to certain order in the file. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006“…RSA Algorithm is a public-key cryptosystem that offers encryption technique which security is based on the difficulty of factoring large prime integers. …”
Get full text
Get full text
Final Year Project -
18
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…The proposed model is able to protect the DNA sequence stored in the Fog Computing cloud from plain text attacks by generating (I) the main key, which is the key to the EAES encryption algorithm, (II) the rule 1 key, which represents the DNA base number of possible key probabilities, and (III) the rule 2 key, which represents the number of binding probabilities for the DNA helical structure. …”
Get full text
Get full text
Get full text
Thesis -
19
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
Published 2018“…Key scheduling algorithm (KSA) is the mechanism that generates and schedules all sub-keys for each round of encryption. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Conflict-free automated guided vehicles routing using multi-objective genetic algorithm
Published 2013“…The algorithm used weight mapping crossover (WMX) and Insertion Mutation (IM) for priority-based representation and parameterized uniform crossover (PUX) for random-key based representation. …”
Get full text
Get full text
Get full text
Article
