Search Results - (( developing security a algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing security »
- implication based »
- java implication »
- a algorithm »
- security a »
-
1
Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar
Published 2012“…New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. …”
Get full text
Get full text
Thesis -
2
-
3
A block cipher based on genetic algorithm
Published 2016“…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
Get full text
Get full text
Get full text
Thesis -
4
Systematic literature review: Trend analysis on the design of lightweight block cipher
Published 2024journal::journal article -
5
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The aim of the thesis is to provide an overview of the ABS encryptiOn algorithm, to develop a prototype that is implemented for communication purpose, and to test the developed prototype in terms of accuracy purpose. …”
Get full text
Get full text
Undergraduates Project Papers -
6
VOICE RECOGNITION FOR SECURITY PURPOSES
Published 2007“…The results show that thecombination of both algorithms has produced a robust Voice Security System.…”
Get full text
Get full text
Final Year Project -
7
A parallel XTS encryption mode of operation
Published 2009“…The parallel XTS algorithm has shown a speedup of 1.80 (with 90% efficiency) faster than the sequential algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
8
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…To improve secure of data in cloud storage by hybrid three algorithms (AES, ECC and RSA).All the existing algorithms has some sort of problems and issues, this had made us decide to develop a safe, correct ad efficient algorithm for having secured data in cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
9
-
10
Secure mobile AES encryptor (SMAE)
Published 2016“…The purpose of this project is to identify a way to develop a mobile web application for the encryption and decryption of files using the 256 –bit Advanced Encryption Standard (AES) encryption algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
11
New approach of cryptography algorithm for e- mail applications
Published 2005“…Cryptography accepts the challenge and plays the main role of the modern secure communication world. The purpose of this paper is to introduce and demonstrate a new algorithm for Internet and e-mail security. …”
Get full text
Get full text
Conference or Workshop Item -
12
Developing a secure mechanism for Bluetooth-based Wireless Personal Area Networks (WPANs)
Published 2007“…The use of digital signatures and trusted or certified public keys form the basic premise and approach in this work in providing stronger security for WPANs. Our work involves developing a prototype for Bluetooth systems using RSA and DSA encryption algorithms. …”
Get full text
Get full text
Get full text
Proceeding Paper -
13
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Cryptography accepts the challenge and plays the main role of the modern secure communication world. The purpose of this thesis is to introduce and demonstrate a new algorithm for Internet and e-mail security. …”
Get full text
Get full text
Thesis -
14
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…This have attracted researchers to find algorithms and methods that can detect intrusions in a short period of time within a huge volume of data with high accuracy. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…In order to provide an energy-efficient and secure routing method for sensors deployed within a dynamic IoT network, this paper presents a trust-aware enhanced ant colony optimization (ACO)-based routing algorithm, incorporating a lightweight trust evaluation model. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Securing m-government transmission based on symmetric and asymmetric algorithms: A review
Published 2023Article -
18
Lightweight PRINCE algorithm IP core for securing GSM messaging using FPGA
Published 2023“…In this study, a new security system design for securing GSM messaging with a lightweight PRINCE algorithm Intellectual Property (IP) Core using Field Programmable Gate Arrays (FPGA) is proposed. …”
Article -
19
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
20
Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT
Published 2021“…Moreover, trusted neighbor discovery is a crucial task. That is why a complementary security measure, trust evaluation system, is adopted here. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
