Search Results - (( development perspective encryption algorithm ) OR ( java evolution optimization algorithm ))
Search alternatives:
- evolution optimization »
- java »
-
1
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…The aim of this evolution is to reflect the unseen time overhead incurred by optimal real-time algorithm, represented by LRE-TL, which might hinder the claimed optimality of such algorithms when they are practically implemented. …”
Get full text
Get full text
Conference or Workshop Item -
2
An overview: Theoretical and mathematical perspectives for advance Encryption standard/Rijndael
Published 2010“…In this study a theoretical and mathematical perspectives for Advance Encryption Standard (AES)/Rijndael of multimedia encryption schemes have been proposed in the literature and description. …”
Get full text
Get full text
Article -
3
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…The unauthorized modification of confidential data is one the main threats and is commonly addressed by cryptographic mechanisms, through encryption. However, in BLE 4.2 environment, encryption algorithms are only applied between BLE devices and gateway thus leaving the network to be vulnerable on the public side of the BLE network which is between the gateway and the server. …”
Get full text
Get full text
Thesis
