Search Results - (( developing security issues algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing security »
- implication based »
- issues algorithm »
- java implication »
-
1
A security payment model for financial payment using mykad
Published 2011“…A system with security technique named Arbitrary Random Security Algorithm (ARSA) and a one-to-one multithreading model need to be developed in order to accelerate the authentication response time of MPM. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…The trust evaluation system has been enhanced in the development of the proposed routing algorithm and the node trust value is evaluated, sensor node misbehavior is identified, and energy conservation is maximized. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
An Improved Rectangle Lightweight Block Cipher Based On 3d Rotation Method
Published 2024thesis::doctoral thesis -
4
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…To improve secure of data in cloud storage by hybrid three algorithms (AES, ECC and RSA).All the existing algorithms has some sort of problems and issues, this had made us decide to develop a safe, correct ad efficient algorithm for having secured data in cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
5
Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat
Published 2008“…The study was initiated by the development of new algorithm for automatic voltage stability assessment (AVSA). …”
Get full text
Get full text
Thesis -
6
Implementation of a parallel XTS encryption mode of operation
Published 2014“…Security of data stored inside storage devices is becoming one of the main issues in computer security now. …”
Get full text
Get full text
Get full text
Article -
7
Improving the security model of software define networks
Published 2023“…These security issues involves around the development to secure the SDN controller of the network, to ensure that any attacks or any unauthorized access are able to apprehend at the earliest stage. …”
text::Final Year Project -
8
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
-
10
Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions
Published 2024“…Malware has emerged as a cyber security threat that continuously changes to target computer systems, smart devices, and extensive networks with the development of information technologies. …”
Article -
11
Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm
Published 2014“…However, due to the serious security issues found in the legacy pairing, a secure and simple pairing called SPP was announced with Bluetooth 2.1 and later since 2007. …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
13
Conceptual deployment models to secure cloud computing / Hajar Ziglari
Published 2012“…Objectives contain identifying data security attributes and threats for cloud, discovering some strategies to recover the cloud computing service delivery to business performance and customers and developing a new model to cover some security issues. …”
Get full text
Get full text
Thesis -
14
Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map
Published 2023“…The goal of this study was to develop a robust image cryptographic scheme based on Latin Square Matrix and Logistics Map, capable of effectively securing sensitive data. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik
Published 2003“…This particular research successfully produced a protocol to suit AES encryption algorithm in Internet Protocol Security (IPSec).…”
Get full text
Get full text
Monograph -
17
Proposed method for enhancing quantum bit error rate using quantum key distribution technique
Published 2014“…In addition also to develop an algorithm for integrating pki and qkd in solving the secrete key sharing issues in grid environment. …”
Get full text
Get full text
Conference or Workshop Item -
18
Conceptual framework for lightweight ciphertext policy-attribute based encryption scheme for internet of things devices / Norhidayah Muhammad and Jasni Mohamad Zain
Published 2019“…Therefore many issue related to IoT devices were discussed especially data security. …”
Get full text
Get full text
Get full text
Article -
19
-
20
