Search Results - (( java implementation using algorithm ) OR ( based feature encryption algorithm ))
Search alternatives:
- implementation using »
- java implementation »
- feature encryption »
- using algorithm »
-
1
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
Get full text
Get full text
Thesis -
2
Image Encrytion Using Block Based Transformation Algorithm
Published 2008“…In this paper, we introduce a block-based transformation algorithm based on the combination of image transformation and a well known encryption and decryption algorithm called Blowfish. …”
Get full text
Get full text
Get full text
Article -
3
An Upgrade on the Key Generation Algorithm of the GGH-MKA Lattice-Based Encryption Scheme
Published 2021“…In the key generation algorithm of the GGH cryptosystem, the good and bad features of the lattice bases are measured by computing orthogonality-defect value. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Conceptual framework for lightweight ciphertext policy-attribute based encryption scheme for internet of things devices / Norhidayah Muhammad and Jasni Mohamad Zain
Published 2019“…Therefore we propose a lightweight Ciphertext Policy-Attribute Based Encryption (CP-ABE) algorithm to implement in IoT devices. …”
Get full text
Get full text
Get full text
Article -
5
An upgrade on the key generation algorithm of the GGH-MKA lattice-based encryption scheme
Published 2021“…In the key generation algorithm of the GGH cryptosystem, the good and bad features of the lattice bases are measured by computing orthogonality-defect value. …”
Get full text
Get full text
Article -
6
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
Published 2022“…Furthermore, the outliers and frequency-based flow feature transformations (FTT) applied to mitigate the poor flow feature have several flaws. …”
Get full text
Get full text
Thesis -
7
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
Get full text
Get full text
Conference or Workshop Item -
8
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
9
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…At the time of writing this thesis, AAḃ algorithm still exists as a mathematical concept and proven in a mathematical based software. …”
Get full text
Get full text
Thesis -
10
Performance analysis and improvement of rabin primitive based cryptosystems
Published 2014“…Finally, we amend the Rabin cryptosystem utilizing the encryption strategy of the AAβ algorithm and run experiments to gauge its efficiency.…”
Get full text
Get full text
Get full text
Thesis -
11
An enhanced fingerprint template protection scheme
Published 2022“…Furthermore, an improved chaos-based encryption algorithm was proposed for encrypting FT. …”
Get full text
Get full text
Thesis -
12
Towards virtuous cloud data storage using access policy hiding in ciphertext policy attribute-based encryption
Published 2021“…To address this issue, we proposed a reinforcement hiding in access policy over Cloud storage by enhancing the Ciphertext Policy Attribute-based Encryption (CP-ABE) algorithm. Besides the encryption process, the reinforced CPABE used logical connective operations to hide the attribute value of data in the access policy. …”
Get full text
Get full text
Article -
13
Attribute-based encryption in securing big data from post-quantum perspective: A survey
Published 2022“…While most recent surveys generally touched on the generic features of attribute-based encryption schemes such as user revocation, scalability, flexibility, data confidentiality, and scope in pairing-based ABE schemes, this survey investigated quantum-resistant ABE schemes in securing big data. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
15
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
16
An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography
Published 2011“…This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
Get full text
Get full text
Get full text
Article -
17
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
18
An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): selective cryptography
Published 2011“…This method took into consideration the good features of selective encryption algorithms with regard to computational complexity, and data compression performance. …”
Get full text
Get full text
Get full text
Article -
19
RENTAKA: A novel machine learning framework for crypto-ransomware pre-encryption detection
Published 2022“…This work describes RENTAKA, a framework based on machine learning for the early detection of crypto-ransomware.The features extracted are based on the phases of the ransomware lifecycle. …”
Get full text
Get full text
Get full text
Article -
20
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
Published 2004“…ClipSecure is rate to be the best fitted features of cryptography system in this project scope for it has choices of nine algorithms, plus a hardcore mode and support for both message and file encryption.…”
Get full text
Get full text
Get full text
Thesis
