Search Results - (( developing security research algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing security »
- research algorithm »
- implication based »
- java implication »
-
1
-
2
A block cipher based on genetic algorithm
Published 2016“…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
Get full text
Get full text
Get full text
Thesis -
3
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…This research hopes to give a clear idea to the readers about ABS algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar
Published 2012“…New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. …”
Get full text
Get full text
Thesis -
5
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…Focus will be given to research that have produced new intrusion detection algorithms, framework and model as well as their gaps in the research. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Systematic literature review: Trend analysis on the design of lightweight block cipher
Published 2024journal::journal article -
7
A parallel XTS encryption mode of operation
Published 2009Get full text
Get full text
Conference or Workshop Item -
8
Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid
Published 2015“…A Database System Engine has been developed to measure the performance of the algorithm. …”
Get full text
Get full text
Thesis -
9
Development of DNA-based dynamic key-dependent block cipher
Published 2015“…Hence, it is necessary to research and develop a secure symmetric cipher algorithm. …”
Get full text
Get full text
Thesis -
10
Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik
Published 2003“…This particular research successfully produced a protocol to suit AES encryption algorithm in Internet Protocol Security (IPSec).…”
Get full text
Get full text
Monograph -
11
Information Security Analysis and Solution using LSB Steganography and AES Cryptographic Algorithm
Published 2023“…The significance of information security analysis and solutions has been emphasized by earlier research in several application areas. …”
Get full text
Get full text
Get full text
Article -
12
A new 128-bit block cipher
Published 2009“…Towards that and after reviewing related research, in this research we propose to come up with a new 128-bit block cipher cryptographic algorithm which shall meet the security requirements. …”
Get full text
Get full text
Thesis -
13
A study on one way hashing function and its application for FTMSK webmail / Mohd Rosli Mohd Daud
Published 2007“…Both are produce at the same year (1994) and come from the same extension, which is MD4. The research are aim to study on Message Digests version 5 (MD5) and Secure Hash Algorithm version 1 (SHA1) with the use for password in email account. …”
Get full text
Get full text
Research Reports -
14
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
15
An Improved Rectangle Lightweight Block Cipher Based On 3d Rotation Method
Published 2024thesis::doctoral thesis -
16
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
17
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
18
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…This issue highlights the need to tackle the network intrusion problem efficiently. This research aim is to study the performance of an improvised Genetic Algorithm (GA) by formulating its problem-specific algorithm for network intrusion problem. …”
Get full text
Get full text
Thesis -
20
