Search Results - (( java implication based algorithm ) OR ( based certification proposed algorithm ))
Search alternatives:
- certification proposed »
- based certification »
- proposed algorithm »
- implication based »
- java implication »
-
1
-
2
Application Of The Blockchain Technology Within Healthcare
Published 2021“…There are four proposed algorithms based on the actions of viewing and writing EMR, as well as another two additional actions aimed at improving the security of the blockchain framework. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
4
A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm
Published 2024“…The effectiveness of the algorithm has been established since it uses an image-based approach after conversion between document and images with a numbering pattern that is fragile to deletion, replacement, insertion, combine, and copy attack. …”
Get full text
Get full text
Thesis -
5
Reliable access control for mobile cloud computing (MCC) with cache-aware scheduling
Published 2019“…Furthermore, the cache-based scheduling algorithm was upgraded to improve the response time of user jobs. …”
Get full text
Get full text
Get full text
Article -
6
Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks
Published 2025“…To address these security challenges, this research proposes a novel Robot Operating System based Ethereum blockchain (ROS-EB) that is responsible for secure and private data storage. …”
Article -
7
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…During a security attack, the MTTD for the existing solution was very high because the existing scheme could not detect the attack. For the proposed scheme, the MTTD was very low which is 4.89 minutes, because of the consensus algorithm. …”
Get full text
Get full text
Thesis -
8
Implementation And Performance Analysis Of Machine Learning Models For Detecting Phishing Attacks On Websites
Published 2023“…To prevent users from falling victim to phishing websites, a machine-learning-based solution is proposed in this project. This project aims to detect phishing websites by implementing a tool that is built from a machine-learning model. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD
