Search Results - (( java application using algorithm ) OR ( timing attack problems algorithm ))
Search alternatives:
- java application »
- using algorithm »
- timing »
- problems »
-
1
Message based random variable length key encryption algorithm.
Published 2009“…Encryption and decryption times measured between 5 and 27 m sec in 2 GHz Pentium and java platform so time variant and fast enough key generation had been kept collision and timing attacks away due to small seized storage. …”
Get full text
Get full text
Article -
2
Attack path selection optimization with adaptive genetic algorithms
Published 2016“…We have incorporated a fuzzy logic controller (FLC) to fine tune the optimization algorithm in run time. The FLC takes into consideration both the exploration and exploitation aspect of the GA. …”
Get full text
Get full text
Article -
3
Attack path selection optimization with adaptive genetic algorithms
Published 2016“…We have incorporated a fuzzy logic controller (FLC) to fine tune the optimization algorithm in run time. The FLC takes into consideration both the exploration and exploitation aspect of the GA. …”
Get full text
Get full text
Article -
4
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
5
A new countermeasure to combat the embedding-based attacks on the goldreich-goldwasser-halevi lattice-based cryptosystem
Published 2024“…Consequently, the simplified CVP can be reduced to a Shortest-Vector Problem (SVP) variant which can be solved by using lattice-reduction algorithms such as the LLL algorithm in a shorter amount of time. …”
Get full text
Get full text
Get full text
Article -
6
A new countermeasure to combat the embedding-based attacks on the Goldreich-Goldwasser-Halevi lattice-based cryptosystem
Published 2024“…Consequently, the simplified CVP can be reduced to a Shortest-Vector Problem (SVP) variant which can be solved by using lattice-reduction algorithms such as the LLL algorithm in a shorter amount of time. …”
Get full text
Get full text
Get full text
Article -
7
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
Published 2019“…This paper proposes a solution for detecting black hole attacks on MANET by using harmony search algorithm (DBHSA), which uses harmony search algorithm (HSA) to mitigate the lateness problem caused by cooperative bait detection scheme (CBDS). …”
Get full text
Get full text
Get full text
Book Chapter -
8
-
9
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
10
Challenges in multi-layer data security for video steganography
Published 2018“…On the other side, the hybridization of the algorithms, increase memory complexity and increase computation time for data embedding. …”
Get full text
Get full text
Get full text
Article -
11
Enhancement of lightweight block cipher algorithms
Published 2017“…This research dealt with three problems; First, it is difficult to optimized three factors at same time. …”
Get full text
Get full text
Book -
12
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Hence, the detection of network attacks on computer systems has remain a relevant field of research for some time. …”
Get full text
Get full text
Thesis -
13
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
Get full text
Get full text
Thesis -
14
-
15
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2024journal::journal article -
16
Cloud Co-Residency Denial of Service Threat Detection Inspired by Artificial Immune System
Published 2024“…A review of the literature shows that there is still a lack of works on cloud IDS that focused on implementing real-time hybrid detections using Dendritic Cell algorithm (DCA) as a practical approach. …”
Proceedings Paper -
17
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Although there are few algorithms for data protection in the Cloud, However, such algorithms are still prone to attack, especially in real-time data movement due to the mechanism employed. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
A new cryptosystem analogous to LUCELG and Cramer-Shoup
Published 2009“…Since the encryption and decryption algorithm of a new cryptosystem is based on the defined Lucas function, it is believed that the security of Lucas function is polynomial-time equivalent to the generalized discrete logarithm problems. …”
Get full text
Get full text
Get full text
Article -
19
A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts
Published 2013“…This work aims to provide a full understanding of the network attacks as well as ease the process for the analysts and save their time. …”
Get full text
Get full text
Thesis -
20
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2018“…A review of the literature shows that there is still a lack of works on cloud IDS that focused on implementing real-time hybrid detections using Dendritic Cell algorithm (DCA) as a practical approach. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
