Search Results - (( java implementation bat algorithm ) OR ( using key using algorithm ))
Search alternatives:
- java implementation »
- implementation bat »
- using algorithm »
- bat algorithm »
- using key »
-
1
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
Enhance key generation algorithm based user string identity as public key
Published 2015“…This algorithm uses a user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
Get full text
Get full text
Thesis -
3
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013“…Previous algorithm was successful used email identity as a public key, but not all type of email can used as a public key. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Enhancement of RSA Key Generation Using Identity
Published 2015“…This algorithm used user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
Get full text
Get full text
Get full text
Book Chapter -
5
Data privacy comparison using advanced encryption standard (AES) and data encryption standard (DES) / Hikma Farah Ali
Published 2019“…The file is encrypted and using this key to decrypt it. In this study existing algorithm DES is a symmetric-key block cipher. …”
Get full text
Get full text
Thesis -
6
Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan
Published 2014“…Asymmetric key algorithm is also known as public-key cryptography, is a class of cryptographic algorithms with require two separate keys, one is secret (private) key and another one is public key. …”
Get full text
Get full text
Thesis -
7
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…A key schedule algorithm is the mechanism that generates and schedules all session-keys for the encryption process. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Secure encryption in network using Data Encryption Standard (DES) for high security transmission
Published 2017“…In the field of network security, the role of cryptography is most important. A secrecy key and shared key algorithm is known as a symmetric key algorithm. …”
Get full text
Get full text
Student Project -
9
Static and self-scalable filter range selection algorithms for peer-to-peer networks
Published 2011“…The static filter range selection algorithm uses a fixed filter range approach to locate the target key, in which the filter range is preset at the beginning of the searching process. …”
Get full text
Get full text
Thesis -
10
Cryptanalysis in cryptographic algorithm design
Published 2006“…Short-cut attacks make use of an algorithm’s weaknesses to discover the key faster than brute-force. …”
Get full text
Conference or Workshop Item -
11
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
Published 2018“…This research proposed a Dynamic Key Scheduling Algorithm (KSA) using isotope of a quasigroup as the dynamic substitution table. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
New Cryptographic Algorithms for Enhancing Security of Voice Data
Published 2010“…Finally, the implementation result in this research shows the average time needed to encrypt and decrypt a voice packet size using a proposed algorithm with the long key of 1024-bits is much smaller than AES_Rijndael algorithm with a short key length of 128-bits.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization
Published 2019“…The objective of this work is to improve our previous action key frames extraction algorithm (AKF) by adapting a threshold which selects action key frames as final key frames. …”
Get full text
Get full text
Article -
14
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…The proposed approach uses a frequency domain combinational framework of coefficients scrambling with Key Scheduling Algorithm based (KSA-based) permutation. …”
Get full text
Get full text
Thesis -
15
Mathematical modelling on communication between two parties / Nor Anees Asyiqin Md Disa, Khairunnisa Munawarah Khairul Anwar and Aniesa Farhana Mazlan
Published 2022“…A shared key is used to implement communication between two parties using an elliptic curve with the prime p and q. …”
Get full text
Get full text
Student Project -
16
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Cryptography: A New Approach of Classical Hill Cipher
Published 2013“…This formulation can produce an involuntary key where a same key can be used for both encryption and decryption. …”
Get full text
Get full text
Article -
18
-
19
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…The second step is to apply the hash method on this message by using shuffle mechanism. Now the message is ready to do the encryption process that is dividing the text message to 128 8-bit for each four sub keys, so if the text message less than 128 8-bit then use another sub key. …”
Get full text
Get full text
Thesis -
20
Breaking A Playfair Cipher Using Single and Multipoints Crossover Based on Heuristic Algorithms
Published 2023Conference Paper
