Search Results - (( process features encryption algorithm ) OR ( java application system algorithm ))
Search alternatives:
- features encryption »
- process features »
- java application »
- system algorithm »
-
1
Challenges of hidden data in the unused area two within executable files
Published 2009“…Conclusion: Features of the short-term responses were simulated that the size of the hidden data does depend on the size of the unused area2 within cover file which is equal 20% from the size of exe.file before hiding process, most antivirus systems do not allow direct write in executable file, so the approach of the proposed system is to prevent the hidden information to observation of these systems and the exe.file still function as usual after the hiding process. …”
Get full text
Get full text
Get full text
Article -
2
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…Performance evaluation shows that XTS exhibits faster speed when an RC6 encryption algorithm is used, compared to other encryption algorithms such as AES and Twofish. …”
Get full text
Get full text
Thesis -
3
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…One such lightweight scheme is the AA-Beta (AAḃ) asymmetric cryptographic scheme whose algorithm consists of only basic arithmetic operations of addition and subtraction for both the encryption and decryption processes. …”
Get full text
Get full text
Thesis -
4
Performance analysis and improvement of rabin primitive based cryptosystems
Published 2014“…Results from the study and analysis found that AAβ cryptosystem have speeds exceeding RSA and ECC cryptosystem encryption process. While the decryption process, AAβ have speeds exceeding RSA and ECC. …”
Get full text
Get full text
Get full text
Thesis -
5
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
Get full text
Get full text
Conference or Workshop Item -
6
An Upgrade on the Key Generation Algorithm of the GGH-MKA Lattice-Based Encryption Scheme
Published 2021“…In the key generation algorithm of the GGH cryptosystem, the good and bad features of the lattice bases are measured by computing orthogonality-defect value. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
An upgrade on the key generation algorithm of the GGH-MKA lattice-based encryption scheme
Published 2021“…In the key generation algorithm of the GGH cryptosystem, the good and bad features of the lattice bases are measured by computing orthogonality-defect value. …”
Get full text
Get full text
Article -
8
Investigation of data encryption algorithm for secured transmission of electrocardiograph (ECG) signal
Published 2018“…This study demonstrates contributions by applying these ideas to two classical problems on the natural algorithm calculation and signal processing.…”
Get full text
Get full text
Conference or Workshop Item -
9
-
10
-
11
Towards virtuous cloud data storage using access policy hiding in ciphertext policy attribute-based encryption
Published 2021“…To address this issue, we proposed a reinforcement hiding in access policy over Cloud storage by enhancing the Ciphertext Policy Attribute-based Encryption (CP-ABE) algorithm. Besides the encryption process, the reinforced CPABE used logical connective operations to hide the attribute value of data in the access policy. …”
Get full text
Get full text
Article -
12
-
13
Database encryption for a Web-based Claims System
Published 2008“…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
Get full text
Thesis -
14
Attribute-based encryption in securing big data from post-quantum perspective: A survey
Published 2022“…Due to its fine-grained features, the ABE scheme is a protection layer in securing users’ data and privacy in big data processing and analytics. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
16
-
17
Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm
Published 2024journal::journal article -
18
A Hybrid Chaotic Image Encryption Scheme Bas~d on S-Box and Ciphertext Feedback
Published 2007“…Due to some intrinsic features of images, such as bulk data capacity and high correlation among pixels, traditional encryption algorithms such as IDEA, DES and AES are not suitable for practical image encryption, especially for real time applications. …”
Get full text
Get full text
Thesis -
19
-
20
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
