Search Results - (( protocol distributed force algorithm ) OR ( java application matching algorithm ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9

    Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing by Jamal, Fara

    Published 2021
    “…An adversary can force the authority to produce false private keys that can tarnish the integrity of the ABE system. …”
    Get full text
    Get full text
    Thesis