Search Results - (( framework improving encryption algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 12 results of 12
Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Error concealment technique using wavelet neural network for wireless transmitted digital images by Al-Azzawi, Alaa Khamees

    Published 2012
    “…The first framework is proposed to compensate for the loss of damaged patches. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Digital certificate-based authentication model for enhanced smartphone security / A. H. Azni, Sakiinah Altaf Hussain and Najwa Hayaati Mohd Alwi by Azni, A. H., Altaf Hussain, Sakiinah, Mohd Alwi, Najwa Hayaati

    Published 2025
    “…This paper introduces an innovative authentication model for smartphones, integrating digital certificates and secret keys to securely encrypt and decrypt data. The model employs the RSA algorithm to generate encryption keys and authenticate user and device identities. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Access control and classifier-based blockchain technology in e-healthcare applications by Maseleno A., Hashim W., Perumal E., Ilayaraja M., Shankar K.

    Published 2023
    “…To improve the security of the healthcare framework, a learning classifier is the support vector machine that is used to characterize sensitive and nonsensitive data from e-healthcare information. …”
    Book Chapter
  8. 8

    Emerging Ransomware Attacks: Improvement and Remedies-A Systematic Literature Review by Wadho, S.A., Yichiet, A., Gan, M.L., Kang, L.C., Akbar, R., Kumar, R.

    Published 2023
    “…This literature review investigates the evolving tactics and techniques of ransomware attackers, the complexities of ransomware-as-a-service (RaaS) models, and the increased sophistication of encryption algorithms. Furthermore, this literature review examines a diversity of remedial measures, such as practical security measures, incident comeback frameworks, and legal considerations. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment by Al-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S.

    Published 2024
    “…The result shows that the proposed method improves the security problem of the system, the message-digest algorithm (MD5) is used to encrypt the user password, and a strict role authorisation system is designed to realise the access and manage the system�s security. � 2023 by author(s). …”
    Article
  10. 10

    Dynamic S-boxes and spiral permutation function on Fibonacci sequence for secure block cipher / Kamsiah Mohamed by Mohamed, Kamsiah

    Published 2022
    “…In this thesis, the Spiral Fibonacci is proposed for a permutation function to diffuse bit permutation in improving cryptography algorithm efficiency. Therefore, this research was carried out using an experimental design framework to analyse the proposed block cipher. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12