Search Results - (( developing subjective encryption algorithm ) OR ( java implication tree algorithm ))
Search alternatives:
- developing subjective »
- subjective encryption »
- java implication »
- implication tree »
- tree algorithm »
-
1
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Thesis -
2
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
Published 2015“…Rabin cryptosystem has fast encryption and proven as secure as the integer factorization problem. …”
Get full text
Get full text
Thesis -
3
An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network
Published 2016“…While the result of FFT algorithm summarizes that the number of the common FFT peak location index for sensors on the same subject is significantly higher compared to the number of common feature for sensors on different subjects.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Design and implementation of a private and public key crypto processor for next-generation it security applications
Published 2006“…Consequently, these IT security issues have been a subject of intensive research in areas of computing, networking and cryptography these last few years. …”
Get full text
Get full text
Get full text
Article
