Search Results - (( share information security algorithm ) OR ( java application using algorithm ))
Search alternatives:
- share information »
- java application »
- using algorithm »
-
1
Shamir secret sharing scheme using newton divided difference interpolati / Md Nizam Udin … [et al.]
Published 2017“…Rivest, Shamir and Adlemen Algorithm or commonly known as RSA Cryptography proposed in the year 1978 to secure confidential information. …”
Get full text
Get full text
Book Section -
2
Secure encryption in network using Data Encryption Standard (DES) for high security transmission
Published 2017“…A secrecy key and shared key algorithm is known as a symmetric key algorithm. …”
Get full text
Get full text
Student Project -
3
Security Framework Based on Reputation Mechanism for Peer-To-Peer Systems
Published 2004“…These information sharing environments are increasingly gaining acceptance on the Internet as they provide an infrastructure in which the desired information can be located and downloaded while preserving the anonymity. …”
Get full text
Get full text
Thesis -
4
-
5
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…In the first and second methods, the visual video information is secured by encrypting limited transformed coefficients using AES algorithm. …”
Get full text
Get full text
Thesis -
6
Secret sharing scheme for key management of secure data sharing in cloud
Published 2019“…Further testing proves that Shamir's Secret Sharing Scheme is more appropriate for large-scale users covering key generation and thresholds to ensure data is completely secure. …”
Get full text
Get full text
Thesis -
7
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
8
Secure mobile AES encryptor (SMAE)
Published 2016“…The reason the AES encryption algorithm selected is because it is considered as one of the most secure encryption algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
9
Secured electrocardiograph (ECG) signal using fully homomorphic encryption technique
Published 2020“…Sharing the patient’s information through the Internet of Thing (IoT) for faster diagnosis has security and privacy issues. …”
Get full text
Get full text
Article -
10
-
11
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
12
Consensus algorithms blockchain: a comparative study
Published 2019“…A blockchain is a Distributed Ledger Technology that has been defined as a “distributed, shared, encrypted database that serves as an irreversible and incorruptible repository of information. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
FRACTIONAL PROPERTY OWNERSHIP BY USING BLOCKCHAIN ALGORITHM
Published 2019Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
14
Blockchain based security framework for device authentication and data communication in decentralized IoT network
Published 2023“…Node authentication is a crucial part of IoT security. Owing to the centralized nature of IoT networks, the current internet security solutions are deemed to be insufficient to meet their security requirements and might even generate more potential points of failure. …”
Get full text
Get full text
Thesis -
15
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…Electronic health records (EHRs) are digitally saved health records that provide information about a person's health. EHRs are generally shared among healthcare stakeholders, and thus are susceptible to power failures, data misuse, a lack of privacy, security, and an audit trail, among other problems. …”
Get full text
Get full text
Get full text
Article -
16
-
17
Development of key-dependent dynamic S-Boxes with dynamic irreducible polynomial and affine constant
Published 2018“…Advanced encryption standard is an encryption algorithm which is widely used to provide security to sensitive information by organizations. …”
Get full text
Get full text
Get full text
Article -
18
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…Electronic health records (EHRs) are digitally saved health records that provide information about a person's health. EHRs are generally shared among healthcare stakeholders, and thus are susceptible to power failures, data misuse, a lack of privacy, security, and an audit trail, among other problems. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis
