Search Results - (( java implication based algorithm ) OR ( based certification proposed algorithm ))

  • Showing 1 - 8 results of 8
Refine Results
  1. 1
  2. 2

    Application Of The Blockchain Technology Within Healthcare by Lin, Michelle Hwei Yee

    Published 2021
    “…There are four proposed algorithms based on the actions of viewing and writing EMR, as well as another two additional actions aimed at improving the security of the blockchain framework. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3
  4. 4

    A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm by Nur Alya Afikah, Usop

    Published 2024
    “…The effectiveness of the algorithm has been established since it uses an image-based approach after conversion between document and images with a numbering pattern that is fragile to deletion, replacement, insertion, combine, and copy attack. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Reliable access control for mobile cloud computing (MCC) with cache-aware scheduling by Jamal, Fara, Abdullah, Mohd Taufik, Mohd Hanapi, Zurina, Abdullah, Azizol

    Published 2019
    “…Furthermore, the cache-based scheduling algorithm was upgraded to improve the response time of user jobs. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks by Atiewi S., Al-Rahayfeh A., Almiani M., Abuhussein A., Yussof S.

    Published 2025
    “…To address these security challenges, this research proposes a novel Robot Operating System based Ethereum blockchain (ROS-EB) that is responsible for secure and private data storage. …”
    Article
  7. 7

    Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing by Jamal, Fara

    Published 2021
    “…During a security attack, the MTTD for the existing solution was very high because the existing scheme could not detect the attack. For the proposed scheme, the MTTD was very low which is 4.89 minutes, because of the consensus algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Implementation And Performance Analysis Of Machine Learning Models For Detecting Phishing Attacks On Websites by Liong, Kah Pong

    Published 2023
    “…To prevent users from falling victim to phishing websites, a machine-learning-based solution is proposed in this project. This project aims to detect phishing websites by implementing a tool that is built from a machine-learning model. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD