Search Results - (( java application using algorithm ) OR ( attack design process algorithm ))
Search alternatives:
- process algorithm »
- java application »
- using algorithm »
- attack design »
-
1
Message based random variable length key encryption algorithm.
Published 2009“…None fixed size key caused avoidance of replaying and other attacks that can happen on fixed sized key algorithms. …”
Get full text
Get full text
Article -
2
Cryptanalysis in cryptographic algorithm design
Published 2006“…The structure of the cryptographic algorithms must be constructed carefully so that it is resilient against attacks. …”
Get full text
Conference or Workshop Item -
3
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…The performance analysis in terms of processing speed of the encryption and decryption process of the DDBC algorithm shows minimal differences in both AES and DDBC algorithm despite of the difference method of transformation used in both algorithms. …”
Get full text
Get full text
Thesis -
4
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
5
Design and analysis of an early heart attack detection using openCV
Published 2022Get full text
Get full text
Get full text
Conference or Workshop Item -
6
-
7
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
8
Attacks detection in 6G wireless networks using machine learning
Published 2023“…The Attacks Detection in 6G (AD6Gs) wireless networks created by this research uses a Machine Learning (ML) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…Therefore, it can be concluded that the strength and validity of KSAHC algorithm have been enhanced as compared to other algorithms and can serve as the alternative algorithm in designing security systems.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Robust Image Zero- Watermarking Based on Complex Zernike Moment
Published 2014Get full text
Get full text
Conference or Workshop Item -
11
-
12
Image authentication using Zernike moment watermarking
Published 2013“…Experimental results showed that this algorithm achieves better bit error rate against JPEG compression, rotation, scale and noise attacks in comparison with other reviewed schemes in this work. …”
Get full text
Get full text
Thesis -
13
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Robust Image Zero-Watermarking Based on Complex Zernike Moment
Published 2014Get full text
Get full text
Conference or Workshop Item -
15
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
16
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
17
Implementation of hashed cryptography algorithm based on cryptography message syntax
Published 2019“…The coding is designed in such a way that there is a malicious attack to destroy the data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Design and Implementation of Advanced Encryption Standard Using Verilog HDL
Published 2020“…The focus of this paper is to match with the existing cryptography algorithm, 128-bit Advanced Encryption Algorithm and improving the processing speed for the design with hardware implementation. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Distributed Denial-of-Service Defense System
Published 2006“…The scope of study will coverthe aspect of howthe attack detection algorithms work and identify the attack traffic, hence develop appropriate attack responses. …”
Get full text
Get full text
Final Year Project -
20
Trust based Lightweight Security Protocol for Device to Device Multihop Cellular Communication
Published 2020“…Formal and computational analysis of TLwS shows that it can mitigate replay attack, Man-in-the-Middle (MITM) attack, freshness attack, interleaving attack, and masquerading attack. …”
Get full text
Get full text
Thesis
