Search Results - (( java implementation re algorithm ) OR ( parameter data encryption algorithm ))

Refine Results
  1. 1

    Encryption selection for WLAN IEEE802.11G by Ahmad, Zahrol Azam

    Published 2013
    “…Meanwhile for encryption algorithms, the data was encrypted using Kryptel, an encryption freeware. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption by Nurnajmin Qasrina Ann, Ayop Azmi

    Published 2023
    “…In addition, the hyperparameter tuning problem is considered in this research to improve the developed hybrid model by using the AOA algorithm. Lastly, a new hybrid technique suggests tackling the current image encryption application problem by using the estimated parameters of chaotic systems with an optimization algorithm, the SKF algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Effect of file sizes on encryption and decryption in constrained devices / Nurnadia Sapri by Sapri, Nurnadia

    Published 2015
    “…TCP protocol can be used in the transmission of data from one host to another host. Simply, it is unsecure because the attacker can break security parameters to obtain access to the data that currently being sent. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A modified approach to improve the performance of AES using feistel structure by Al-Ansi, Afeef Yahya Ahmed

    Published 2018
    “…In encryption algorithm design, apart from the security performance, processing performance and the cost of the implementation are very important trade-off parameters. …”
    Get full text
    Get full text
    Thesis
  6. 6

    An analysis of lowest energy consumption (CPU time) through running several cryptography algorithms with different video formats by Jamil Alsayaydeh, Jamil Abedalrahim, Mohammad Alshannaq, Osama Saleh, Mohammad Nawafleh, Mohammad Mahmoud, Mohammad Nawafleh, Odai Yassin, Baharon, Mohd Rizuan, Baharudin, Zikri Abadi, Zainon, Maslan, Aziz, Azwan

    Published 2023
    “…It may similarly be described as the science that utilizes mathematics in decryption and encryption data processes. In this article, we consider different significant algorithms utilized for data decryption and encryption in whole areas, for making a comparative study for most vital algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Analysis of avalanche effect on advance encryption standard by using dynamic S-Box depends on rounds keys by Nejad, Farshid Hossein, Sabah, Saman, Jam, Amid Jamshidi

    Published 2014
    “…The aim of this paper is to design dynamic S-Box which depends on rounds keys for encryption in AES-128. The parameters of the dynamic S-Box have features equivalent to those in the normal algorithm AES. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Efficient dynamic DNA-based block cipher algorithm by Chng, Chern Wei

    Published 2023
    “…They possess a wide range of applications, spanning from guaranteeing the security of web traffic through protocols like SSL/TLS to encrypting confidential data stored on hard drives. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff by Fatin Nabila , Abd Latiff

    Published 2021
    “…For high security, encryption is one of the methods used to protect data against leakage. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA by Ahmed, Shakil

    Published 2013
    “…Storage encryption (data at-rest) has now become an important aspect in today’s computing environment. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Obfuscatable aggregatable signcryption scheme with PadSteg for unattended devices in IoT systems by Uwadiegwu, Inyama Victor

    Published 2019
    “…Obfuscatable Aggregatable Signcryption (OASC) is the combination of cryptography technique such as digital signature with data encryption and obfuscation to protect data in the IoT system. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Implementation of High Speed Large Integer Multiplication Algorithm on Contemporary Architecture by Chang, Boon Chiao

    Published 2018
    “…To achieve certain level of security, Public Key Cryptography algorithm is performed on large integer that is more than 64-bit, typical bit size supported by conventional Central Processing Unit (CPU) (e.g. 512-bit for Elliptic Curve Cryptography (ECC), 2048-bit for Rivest-Shamir-Adleman (RSA) and million bits for Fully Homomorphic Encryption (FHE)). …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    Secure lightweight client for cloud-based E-Health Model by Zhang, Xiaowei

    Published 2023
    “…This algorithm verifies the identity and permission of non-group members to meet the strict privacy protection requirements of EHRs data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Elgamal digital signature scheme with integrated CFEA-technique by Arif Mandangan, Che Haziqah Che Hussin, Chang, Ee Hung

    Published 2016
    “…In order to provide good level of security, proper parameters must be used in this scheme. This includes the size of the parameters. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Elgamal Digital Signature Scheme With Integrated CFEA-Technique by Arif Mandangan, Che Haziqah Che Hussin, Chang Ee Hung

    Published 2016
    “…In order to provide good level of security, proper parameters must be used in this scheme. This includes the size of the parameters. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…It involves the process of re-testing software after modifications. Ideally, to perform regression testing is to re-execute all the test cases on the modified software. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks by Sadeghi, Mohammad Mehdi Gilanian

    Published 2015
    “…One of the trees is a binary tree data structure and the other is a B-tree data structure. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Image orientation watermarking technique for copyright protection by Jasim, Hend Muslim

    Published 2016
    “…Watermarking attracts much interest in algorithm design to enable a signature to be embedded on secrecy and encryption beds. …”
    Get full text
    Get full text
    Get full text
    Thesis