Search Results - (( engine using encryption algorithm ) OR ( java simulation optimization algorithm ))
Search alternatives:
-
1
-
2
-
3
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
4
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
5
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
Published 2006Get full text
Get full text
Monograph -
6
-
7
A New Hybrid Image Encryption Technique Using Lorenz Chaotic System and Simulated Kalman Filter (SKF) Algorithm
Published 2022“…Nowadays, encryption is one of the most popular and effective security methods used by company and organizations. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Enhanced chaotic image encryption algorithm based on Baker's map
Published 2003Get full text
Get full text
Article -
9
Privacy in medical emergency system: cryptographic and security aspects
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
10
Design and implementation of advanced encryption standard using verilog HDL
Published 2022Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
Image encryption algorithm based on chaotic mapping
Published 2003“…This paper discusses an alternative symmetric-key encryption algorithm for securing images, namely Secure Image Encryption (SIP) that is based on chaos. …”
Get full text
Get full text
Get full text
Article -
13
-
14
IoT data encryption algorithm for security
Published 2020Get full text
Get full text
Get full text
Get full text
Thesis -
15
Data hiding in medical images using encryption and steganography techniques
Published 2019Get full text
Get full text
Get full text
Undergraduates Project Papers -
16
-
17
Serpent encryption algorithm implementation on Compute Unified Device Architecture (CUDA)
Published 2010Get full text
Get full text
Conference or Workshop Item -
18
Serpent encryption algorithm implementation on Compute Unified Device Architecture (CUDA)
Published 2010Get full text
Get full text
Conference or Workshop Item -
19
DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE
Published 2019Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
20
Analysis of parabolic antennas for radio telescopes and the development of encryption methods for radio astronomical images
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis
