Search Results - (( solution integration encryption algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- solution integration »
- implication based »
- java implication »
-
1
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025“…This project addresses these security concerns by developing a secure data collection and visualisation system using Raspberry Pi and Node-RED. The system integrates multiple robust encryption algorithms—AES-128, AES-256, ChaCha20, and Twofish—for end-to-end data protection. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…This increases the security problems in security such as data confidentiality, data integrity and data availability, so the solution of such problems are conducted by adopting data encryption is very important for securing users data. …”
Article -
3
An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices
Published 2017“…To ensure higher security level, the developed system is implemented using the NIST-certified XTS-AES block encryption algorithm. Other storage encryption algorithms, i.e. …”
Get full text
Get full text
Get full text
Thesis -
4
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…The solution that has been suggested is one that is both secure and effective when it is put to use in conjunction with the ECG and Covid-19 image encoding algorithms. …”
Get full text
Get full text
Get full text
Thesis -
5
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…The proposed Multi-Authority Attribute-Based Encryption with Cache-Aware Scheduling for Mobile Cloud Access Control in Mobile Cloud Computing environment analysis of the theoretical and implemented results demonstrated that the scheme performed better compared to the previous work solution in terms of availability and integrity. …”
Get full text
Get full text
Thesis -
7
Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA
Published 2013“…Also the parallel AES-XTS encryption and decryption design were used to develop integrated chip of AES-XTS on FPGA. …”
Get full text
Get full text
Thesis -
8
Feasibility of quantum cryptography with AES for secure communication
Published 2026“…This paper proposes a hybrid encryption approach that integrates quantum key distribution (QKD) with a simplified 3×3 advanced encryption standard (AES) key matrix, creating a lightweight system. …”
Get full text
Get full text
Get full text
Proceeding Paper -
9
Implementing server-side federated learning in an edge-cloud framework for precision aquaculture
Published 2025“…The final product integrates edge computing, federated learning, encryption and cloud storage to create a privacy-preserving and cost-effective solution for monitoring aquaculture environments and supporting small-scale farmers.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…The unauthorized modification of confidential data is one the main threats and is commonly addressed by cryptographic mechanisms, through encryption. However, in BLE 4.2 environment, encryption algorithms are only applied between BLE devices and gateway thus leaving the network to be vulnerable on the public side of the BLE network which is between the gateway and the server. …”
Get full text
Get full text
Thesis -
11
Obfuscatable aggregatable signcryption scheme with PadSteg for unattended devices in IoT systems
Published 2019“…Motivated by this issue, we propose Signcryption Obfuscatable and Steganography-PadSteg (SOS) algorithm as a solution. Having Signcryption (digital signature and encryption) at each node is the baseline of security but the caveat is that the computational power of these components means both mechanisms will not be of highest security level hence the need to protect the information as it travels for a final process of obfuscation. …”
Get full text
Get full text
Thesis -
12
Towards quick response and secure online banking transactions: using data compression and cryptography
Published 2013“…This paper is going to review and address the current issues involving the online banking security by introducing the new quick and secure (QAS) process that has impact and accelerated the online banking transactions and set the bar high for a new frontier encryption algorithms.…”
Get full text
Get full text
Get full text
Proceeding Paper -
13
Proposed method for enhancing quantum bit error rate using quantum key distribution technique
Published 2014“…In addition also to develop an algorithm for integrating pki and qkd in solving the secrete key sharing issues in grid environment. …”
Get full text
Get full text
Conference or Workshop Item -
14
Developing a prototype e-commerce application with credit card validation and secure transaction
Published 2005“…Anyhow,the problem with e-commerce application is that many of them are not secure.This application is designed to enhance the e-commerce applications with additional security items.The security enhancement made was integrating an encryption module that secures the data that are stored in the databases. …”
Get full text
Get full text
Undergraduates Project Papers -
15
-
16
Secure lightweight client for cloud-based E-Health Model
Published 2023“…It is a novel model integrating critical security technologies and manifesting four necessary features of a secure EHR system. …”
Get full text
Get full text
Get full text
Thesis -
17
An Improved Rectangle Lightweight Block Cipher Based On 3d Rotation Method
Published 2024thesis::doctoral thesis -
18
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
Published 2004“…To identify the best cryptographic algorithm suitable for smartcard applications, the dissertation also investigates the implementation of Elliptic Curve encryption techniques and presents performance comparisons based on similar techniques. …”
Get full text
Get full text
Thesis -
19
Multicast-unicast key management and data delivery method in wireless IPv6 networks
Published 2012“…Considering a highly dense environment where connection of users to the network is frequently changing due to join or leave operations, such approach may burden a network device with a huge amount of complex encryption and decryption process.While a number of algorithms has been proposed to address this issue, most of the existing approaches have to increase their encryption and decryption cycles in order to maintain the security level of the key management, thereby again suffering from high computation cost. …”
Get full text
Get full text
Thesis -
20
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis
