Search Results - (( developing security new algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing security »
- implication based »
- java implication »
- new algorithm »
- security new »
-
1
Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar
Published 2012“…The purpose of this study was to design and develop new secure plug-in on Microsoft Outlook using integration of symmetric and asymmetric cryptographic algorithm. …”
Get full text
Get full text
Thesis -
2
-
3
A block cipher based on genetic algorithm
Published 2016“…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
Get full text
Get full text
Get full text
Thesis -
4
A new 128-bit block cipher
Published 2009“…Towards that and after reviewing related research, in this research we propose to come up with a new 128-bit block cipher cryptographic algorithm which shall meet the security requirements. …”
Get full text
Get full text
Thesis -
5
New approach of cryptography algorithm for e- mail applications
Published 2005“…Cryptography accepts the challenge and plays the main role of the modern secure communication world. The purpose of this paper is to introduce and demonstrate a new algorithm for Internet and e-mail security. …”
Get full text
Get full text
Conference or Workshop Item -
6
Development of DNA-based dynamic key-dependent block cipher
Published 2015“…The rise in the frequency of attacks against the AES has ot been matched by the level of development in the capabilities of the algorithm to withstand these challenges and make the AES secure and immune to all risks. …”
Get full text
Get full text
Thesis -
7
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Recently the importance of mobile security coincides with the development of mobile computing. …”
Get full text
Get full text
Conference or Workshop Item -
8
VOICE RECOGNITION FOR SECURITY PURPOSES
Published 2007“…This report presents the implementation of Voice Recognition System for Security Purposes. The scope of study is to understand the existing algorithms and develop a brand new algorithm which is better in terms of its reliability and accuracy. …”
Get full text
Get full text
Final Year Project -
9
-
10
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…This was due to each solution deploy was highly depended with the algorithms reside in the program loaded in the security tools. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Adaptive artificial neural network for power system security assessment and control action
Published 2012“…This study also investigates the reliability of ANN application in power system security assessment in terms of accuracy and computational time as well as developing a new method that can be included in security assessment tools. …”
Get full text
Get full text
Thesis -
12
A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate
Published 2019“…By combining the proposed scalar arithmetic and the new point arithmetic 5P, a new scalar multiplication algorithm was developed. …”
Get full text
Get full text
Thesis -
13
A security payment model for financial payment using mykad
Published 2011“…Moreover, the development of ARSA makes this model more secure and safer for the customers.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…The results show that the new algorithm AES-ECC-RSA (AER) was more secure than the remaining algorithms and it proved to be more secure but needed longer time to encrypt data and decrypt data.…”
Get full text
Get full text
Get full text
Thesis -
15
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Cryptography accepts the challenge and plays the main role of the modern secure communication world. The purpose of this thesis is to introduce and demonstrate a new algorithm for Internet and e-mail security. …”
Get full text
Get full text
Thesis -
16
A new cryptosystem analogous to LUCELG and Cramer-Shoup
Published 2009“…Based on LUCELG and Cramer-Shoup cryptosystems, a new public key cryptosystem is developed by generating the key generation, encryption and decryption algorithm. …”
Get full text
Get full text
Get full text
Article -
17
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
18
Conceptual deployment models to secure cloud computing / Hajar Ziglari
Published 2012“…Objectives contain identifying data security attributes and threats for cloud, discovering some strategies to recover the cloud computing service delivery to business performance and customers and developing a new model to cover some security issues. …”
Get full text
Get full text
Thesis -
19
A new image scrambling technique using block rotation algorithm based on Rubik’s cube
Published 2013“…Objectives: the objective of this paper is to develop a new efficient image scrambling algorithm by using the Rotation technique in order to break the relationship among image elements (pixels). …”
Get full text
Get full text
Get full text
Article -
20
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…Deductively, the proposed KD-3D-CA block cipher algorithm is more secure than other block cipher algorithms and can be implemented for data encryption and decryption.…”
Get full text
Get full text
Thesis
