Search Results - (( developing public trust algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    Rift: a high-performance consensus algorithm for Consortium Blockchain by Khan, Fazeel Ahmed, Ibrahim, Adamu Abubakar, Marwan, Mahmoud, Al-Khasawneh, Mahmoud Ahmad, Alarood, Ala Abdulsalam

    Published 2019
    “…These technologies allow to have a distributed peer-to-peer network in which each external entity can be able to interact with other entities without any trusted intermediary in a verifiable manner. The existing consensus algorithms are mostly concerned with public blockchain having focused on public ledgers in general. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4
  5. 5

    Developing a secure mechanism for Bluetooth-based Wireless Personal Area Networks (WPANs) by Othman, Marini, Hassan, Wan Haslina, Hassan Abdalla Hashim, Aisha

    Published 2007
    “…Our work involves developing a prototype for Bluetooth systems using RSA and DSA encryption algorithms. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    A security payment model for financial payment using mykad by Ahmad Zahari, Nurul Huda

    Published 2011
    “…However, to make this payment model accepted by the public, the focus should be made on two issues; trust/security issue and performance issue. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Algorithmic fairness in AI-driven project management for post-conflict and developing regions: a critical review and framework for context-aware AI by Ahmed Al-Azazi, Saleem, Alawag, Aawag Mohsen, Saif, Amin

    Published 2026
    “…However, deploying AI uncritically in the data-poor and socially fragile environments of post-conflict and developing regions creates profound ethical risks. Standard technical solutions for algorithmic fairness, which require large, clean datasets, are fundamentally misaligned with these realities. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography by Abomhara, Mohamed, Khalifa, Othman Omran, Zaidan , A. A., Zaidan , B. B., Zakaria, Omar, Gani, Abdullah

    Published 2011
    “…This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): selective cryptography by Abomhara, Mohamed, Khalifa, Othman O., Zaidan, A.A., Zaidan, B.B., Zakaria, Omar, Gani, Abdullah

    Published 2011
    “…Moreover, it is a suitable technique for secure H.264 bitstreams that require transmission or storage in un-trusted intermediate devices.…”
    Get full text
    Get full text
    Get full text
    Article
  14. 14