Search Results - (( java application matching algorithm ) OR ( java identification task algorithm ))

  • Showing 1 - 8 results of 8
Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…However, machines from different domains collaborate on the same data and task, raising security and privacy concerns about cross-domain communications. …”
    Get full text
    Get full text
    Thesis