Search Results - (( problems data encryption algorithm ) OR ( java simulation optimization algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Hybrid cryptography algorithm to improve security cloud storage by Abd Almohsen, Inam Razzaq

    Published 2017
    “…ECC, AES, and RSA algorithms will be used to encrypt the files to enhance security data on the cloud storage. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen by Shawkat S.A., Tuama B.A., Al-Barazanchi I.

    Published 2023
    “…This increases the security problems in security such as data confidentiality, data integrity and data availability, so the solution of such problems are conducted by adopting data encryption is very important for securing users data. …”
    Article
  5. 5

    Lightweight encryption technique to enhance medical image security on internet of medical things applications by Hasan, Mohammad Kamrul, Islam, Shayla, Sulaiman, Rossilawati, Khan, Sheroz, Hassan Abdalla Hashim, Aisha, Habib, Shabana, Islam, Mohammad, Alyahya, Saleh, Ahmed, Musse Mohamed, Kamil, Samar, Hassan, Md Arif

    Published 2021
    “…Due to data size limitations, redundancy, and capacity, traditional encryption techniques cannot be applied directly to e-health data, especially when patient data are transferred over the open channels. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari by Mohammad Zahari, Mohamad Zakirin

    Published 2014
    “…However, AES users or application that using AES algorithm might face the problem of computational overhead. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Cryptography: A New Approach of Classical Hill Cipher by Abdul Rahman, Mohd Nordin, Yusof, Mohd Kamir, Abidin @ Bharun, Ahmad Faisal Amri, Mohamad Usop, Nor Surayati

    Published 2013
    “…Moreover, neither of these algorithms are suitable for all zeroes plaintext block encryption. …”
    Get full text
    Get full text
    Article
  8. 8

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption by Nurnajmin Qasrina Ann, Ayop Azmi

    Published 2023
    “…Lastly, a new hybrid technique suggests tackling the current image encryption application problem by using the estimated parameters of chaotic systems with an optimization algorithm, the SKF algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Investigation of data encryption algorithm for secured transmission of electrocardiograph (ECG) signal by Shaikh, Muhammad Umair, Ahmad, Siti Anom, Wan Adnan, Wan Azizun

    Published 2018
    “…This problem will be solved by encrypting the signals, using the proposed fully homomorphic encryption (FHE) technique. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm by Khor, Lay Hoong

    Published 2006
    “…In this project, the Blowfish encryption algorithm is chosen because it is among the safest algorithm used nowadays. …”
    Get full text
    Get full text
    Monograph
  14. 14

    An analysis of lowest energy consumption (CPU time) through running several cryptography algorithms with different video formats by Jamil Alsayaydeh, Jamil Abedalrahim, Mohammad Alshannaq, Osama Saleh, Mohammad Nawafleh, Mohammad Mahmoud, Mohammad Nawafleh, Odai Yassin, Baharon, Mohd Rizuan, Baharudin, Zikri Abadi, Zainon, Maslan, Aziz, Azwan

    Published 2023
    “…It may similarly be described as the science that utilizes mathematics in decryption and encryption data processes. In this article, we consider different significant algorithms utilized for data decryption and encryption in whole areas, for making a comparative study for most vital algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security by H. Belgassem, Seddeq

    Published 2004
    “…The deployment of network security procedures requires the implementation of Cryptographic algorithms. To facilitate this security issue, it is best to define a problem and advice a solution. …”
    Get full text
    Get full text
    Thesis
  16. 16

    An overview of video encryption techniques by Abomhara, Mohamed, Zakaria, Omar, Khalifa, Othman Omran

    Published 2010
    “…Over the last few years several encryption algorithms have applied to secure video transmission. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    An improved chaotic image encryption algorithm by Al-Khasawneh, Mahmoud Ahmad, Shamsuddin, Siti Mariyam, M.Kamrul Hasan, Shafaatunnur, Ibrahim, Adamu Abubakar

    Published 2018
    “…Chaotic-based image encryption algorithms are countless in number. Encryption techniques based on Chaos are among the most effectual algorithms for encryption of data image. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20