Search Results - (( problems _ encryption algorithm ) OR ( java simulation optimization algorithm ))
Search alternatives:
- java simulation »
- problems »
-
1
On the Computational Cost of Cocks’ Identity Based Encryption
Published 2018“…The security of Cocks’ Identity Based Encryption lies on integer factorization problem and quadratic residuosity modulo composite N problem. …”
Get full text
Get full text
Article -
2
Cryptography: A New Approach of Classical Hill Cipher
Published 2013“…Moreover, neither of these algorithms are suitable for all zeroes plaintext block encryption. …”
Get full text
Get full text
Article -
3
Performance evaluation for different data encryption algorithms on wireless sensor network (WSN)
Published 2018“…Therefore, the aim of the project is to analyse and evaluate various different algorithms used image encryption in WSN. The algorithms considered are AES, SF and SIT algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Modification of text encryption based on Elliptic Curve Cryptography (ECC) and Cayley-Purser Algorithm / Nurul Sakinah Ismail
Published 2019“…The modified scheme is considered secure against eavesdroppers if the suitable points on the elliptic curve are remains hard to be found. However, even this problem remains hard today, it is still very likely in the future that efficient algorithms are found and the ECC problem could be solving. …”
Get full text
Get full text
Student Project -
5
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…Throughout this research, a new algorithm from NIST that is Advance Encryption Standard (AES) is found can be used in IPSec to overcome these problems. …”
Get full text
Get full text
Conference or Workshop Item -
6
A new image encryption algorithm based on single S-box and dynamic encryption step
Published 2021“…Secondly, a new dynamic encryption step method is proposed to solve the high correlation and deterministic problems in multiple S-box encryptions. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Experiment -
7
A New Hybrid Image Encryption Technique Using Lorenz Chaotic System and Simulated Kalman Filter (SKF) Algorithm
Published 2022“…A new hybrid technique, Lorenz chaotic system and an optimization algorithm, Simulated Kalman Filter (SKF) had been proposed to solve image encryption problem. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari
Published 2014“…However, AES users or application that using AES algorithm might face the problem of computational overhead. …”
Get full text
Get full text
Thesis -
9
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
10
-
11
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
Published 2006“…In this project, the Blowfish encryption algorithm is chosen because it is among the safest algorithm used nowadays. …”
Get full text
Get full text
Monograph -
12
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…The deployment of network security procedures requires the implementation of Cryptographic algorithms. To facilitate this security issue, it is best to define a problem and advice a solution. …”
Get full text
Get full text
Thesis -
13
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…ECC, AES, and RSA algorithms will be used to encrypt the files to enhance security data on the cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
14
Lightweight encryption technique to enhance medical image security on internet of medical things applications
Published 2021“…However, the study has found that the existing proposed techniques still face application-specific several security problems. Therefore, this paper presents an efficient, lightweight encryption algorithm to develop a secure image encryption technique for the healthcare industry. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
15
A DNA-dynamic permutation-diffusion algorithm for image encryption using scaling chaotification models and advanced DNA operations
Published 2025“…To evaluate the proposed algorithm, extensive experiments have been conducted, and results have been compared with the latest encryption algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
Get full text
Get full text
Conference or Workshop Item -
17
An improved chaotic image encryption algorithm
Published 2018“…Chaotic-based image encryption algorithms are countless in number. Encryption techniques based on Chaos are among the most effectual algorithms for encryption of data image. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…Lastly, a new hybrid technique suggests tackling the current image encryption application problem by using the estimated parameters of chaotic systems with an optimization algorithm, the SKF algorithm. …”
Get full text
Get full text
Thesis -
19
An overview of video encryption techniques
Published 2010“…Over the last few years several encryption algorithms have applied to secure video transmission. …”
Get full text
Get full text
Get full text
Article -
20
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis
