Search Results - (( using function method algorithm ) OR ( data protection method algorithm ))
Search alternatives:
- protection method »
- method algorithm »
- function method »
- using function »
-
1
DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE
Published 2019“…Previously, many encryption algorithms have been investigated. The Cryptography Algorithm is used to protect data through encryption that allows sensitive information to be passed through the network safely. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
2
Protection of the texts using Base64 and MD5
Published 2012“…So using the two protection methods together will increase the security level for protecting the data.…”
Get full text
Get full text
Get full text
Article -
3
Discovering decision algorithm from a distance relay event report
Published 2009“…The method of discovering the distance relay decision algorithm essentially involved formulating rough set discernibility matrix and function from relay event report, finding reducts of pertinent attributes using genetic algorithm and finally generating relay prediction rules. …”
Get full text
Get full text
Get full text
Article -
4
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
5
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Although there are few algorithms for data protection in the Cloud, However, such algorithms are still prone to attack, especially in real-time data movement due to the mechanism employed. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Protection of the digital Holy Quran hash digest by using cryptography algorithms
Published 2013“…The objective of this paper demonstrating CARCA method to encrypt the outputted hash digest generated by Gear hash function for protecting the digital Holy Quran.…”
Get full text
Get full text
Get full text
Proceeding Paper -
7
Breaking A Playfair Cipher Using Single and Multipoints Crossover Based on Heuristic Algorithms
Published 2023Conference Paper -
8
A comparison of clustering algorithms for data anonymization / Zahra Mahmoud
Published 2019“…Over the years, there has been extensive research on data security. Literature review showed that many researches have employed methods such as data encryption or privacy protection data publishing (PPDP). …”
Get full text
Get full text
Get full text
Thesis -
9
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
Published 2018“…Hence, a validation protocol algorithm based on hash function labelling provides a one-time security header for transferable files that protects data in transit against any unauthorized injection. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
IoT data encryption algorithm for security
Published 2020Get full text
Get full text
Get full text
Get full text
Thesis -
11
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
Published 2006“…The first stage of this project is the study of Blowfish algorithm and translates the method into VHDL code because VHDL has been commonly used as a design entry language for FPGA in digital design. …”
Get full text
Get full text
Monograph -
12
Differential Evolution Based Special Protection and Control Scheme for Contingency Monitoring of Transmission Line Overloading
Published 2017“…IEEE 30-bus test system was used to verify the effectiveness of the implemented methods.…”
Get full text
Get full text
Get full text
Book Section -
13
Statistical analysis on enhanced 3D-AES block cipher cryptographic algorithm / Nor Azeala Mohd Yusof
Published 2021“…Many algorithms such as AES, LED, KTANTAN, KATAN, L-Block, SIMON, SPECK, RECTANGLE, and GRAIN-128 have performed randomness test using NIST Statistical Test Suite. …”
Get full text
Get full text
Thesis -
14
A study on one way hashing function and its application for FTMSK webmail / Noor Hasimah Ibrahim Teo
Published 2005“…One of it is call one-way hashing function. One-way hashing function consists of several algorithms. …”
Get full text
Get full text
Thesis -
15
E-Raser: file shredder application with content replacement by using random words function
Published 2018“…Data shredding indicates a process of irreversible file destruction while file shredder is the program designed to render computer-based files unreadable by implementing overwriting method to destroy data in the content of a file. …”
Get full text
Get full text
Get full text
Article -
16
Optimal overcurrent relay coordination in wind farm using genetic algorithm
Published 2015“…Many suggestions have been made and approaches implemented, however one of the most prominent methods is the use of Genetic Algorithm (GA) to improve the function and coordination of OCRs. …”
Get full text
Get full text
Thesis -
17
Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik
Published 2003“…Hashing function implementation have been using in this system as its cryptography algorithm. …”
Get full text
Get full text
Monograph -
18
Simulation-Based Power Estimation for High Throughput SHA-256 Design on Unfolding Transformation
Published 2022“…Several cryptographic SHA-256 hash algorithms have been developed to enhance the performance of data-protection techniques. …”
Get full text
Get full text
Get full text
Proceeding -
19
Flexible content authorization using digital rights management in cloud computing / Ali Hussain
Published 2021“…The integrity of data is verified with the use of HMAC algorithm chain using the verify function of versifier in Macaroon. …”
Get full text
Get full text
Get full text
Thesis -
20
Systematic literature review: Trend analysis on the design of lightweight block cipher
Published 2024journal::journal article
