Search Results - (( java pattern classification algorithm ) OR ( passing interface encryption algorithm ))
Search alternatives:
- pattern classification »
- interface encryption »
- java »
-
1
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Advanced Encryption Standard (AES) was chosen as encryption algorithm and HMAC Standard Hash Algorithm 1 (SHA1) was chosen as HMAC algorithm. …”
Get full text
Get full text
Thesis -
2
A modification of Shamir's Three-Pass protocol by implementing one-time pad algorithm / Nur Khairunnisa' Kusman, Nurul Hanis Abd Rashid and An Nur Ameera Zamani
Published 2019“…As a result, this study success to develop the algorithm by implemented one-time pad in Shamir's three-pass protocol. …”
Get full text
Get full text
Student Project -
3
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007“…The communication between the two processors was done via Message Passing Interface (MPI). Based on the performance simulations, the new parallel algorithm gained speedup of 1.74 with 85% efficiency over the current (sequential) algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
4
Improving security performance with parallel crypto operations in SSL bulk data transfer
Published 2009“…The communication between the two processors was done via Message Passing Interface (MPI). Based on the performance simulations, the new parallel algorithm gained speedup of 1.74 with 85% efficiency over the sequential (current) algorithm.…”
Get full text
Get full text
Get full text
Article -
5
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006“…This report explains the project of developing Parallel Processing of RSA Algorithm Using MPI Library. RSA Algorithm is a public-key cryptosystem that offers encryption technique which security is based on the difficulty of factoring large prime integers. …”
Get full text
Get full text
Final Year Project -
6
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis
