Search Results - (( using improved encryption algorithm ) OR ( java simulation optimization algorithm ))
Search alternatives:
- improved encryption »
- java simulation »
-
1
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…Hence, this study aims to improve the limitations found in the existing chaotic-based encryption algorithms for FTP by improving its encryption speed using Henon and Logistic map. …”
Get full text
Get full text
Get full text
Article -
2
Secure encryption in network using Data Encryption Standard (DES) for high security transmission
Published 2017“…The objective of this paper is to improve the security data by using DES algorithm. …”
Get full text
Get full text
Student Project -
3
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Advanced Encryption Standard (AES) was chosen as encryption algorithm and HMAC Standard Hash Algorithm 1 (SHA1) was chosen as HMAC algorithm. …”
Get full text
Get full text
Thesis -
4
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010“…The objective of this project is to explore the way of doing encryption, improve certain aspect of the existing algorithm and to find out a way to create better security. …”
Get full text
Get full text
Undergraduates Project Papers -
5
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010“…In daily life,we use Internet or accessing information from various sources.Some of the procedure requires us to sending our own information.The objective of this project is to explore the way of doing encryption,improve certain aspect of the existing algorithm and to find out a way to create better security.In this project,encryption will be implemented in information on a web that makes it hard to be readable and secure.For that matter,encryption method known as Caesar cipher,one of the simplest and most widely used encryption techniques.In this encryption,it uses the substitution cipher in which each letter in the plaintext is replaced by some fixed number of position down the alphabet. …”
Get full text
Get full text
Undergraduates Project Papers -
6
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…ECC, AES, and RSA algorithms will be used to encrypt the files to enhance security data on the cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
7
Mobile application design for protecting the data in cloud using enhanced technique of encryption
Published 2024journal::journal article -
8
Enhancing Cryptographic Resilience through Symmetric Encryption Algorithm Utilizing Variable Length Chromosomes Genetic Algorithm
Published 2026journal::journal article -
9
Improving security performance with parallel crypto operations in SSL bulk data transfer
Published 2009“…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
Get full text
Get full text
Get full text
Article -
10
Improving The Randomness of Output Sequence for The Advanced Encryption Standard Cryptographic Algorithm
Published 2005“…Rijndael, the Advanced Encryption Standard (AES) is an encryption standard uses ByteSub, Shiftrow, Mixcolumn and KeyExpansion functions which are the principle of generating a random and pseudorandom numbers. …”
Get full text
Get full text
Thesis -
11
DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE
Published 2019“…The RIPEMD-160 can improve the security in storing information. This project used iterative method to investigate the security algorithm and implemented the algorithm. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
12
-
13
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
14
A DNA-dynamic permutation-diffusion algorithm for image encryption using scaling chaotification models and advanced DNA operations
Published 2025“…To evaluate the proposed algorithm, extensive experiments have been conducted, and results have been compared with the latest encryption algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
Published 2016“…The proposed solution improves the performance of the standard ECC and outperforms the AES algorithm in terms of encryption speed and response time.…”
Get full text
Get full text
Thesis -
16
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…These algorithms are being used as encryption algorithm in Encapsulated Security Payload (ESP) protocol. …”
Get full text
Get full text
Conference or Workshop Item -
17
An efficient secure ECG compression based on 2D-SPIHT and SIT algorithm
Published 2017“…This research proposes an efficient combination of a compression and an encryption algorithms. Two-Dimension Set Partitioning in Hierarchical Tree (2D-SPIHT) used to optimally compress signals then combined with recently lightweight encryption algorithm, namely Secure IoT (SIT). …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…This paper proposes an efficient approach to improve Rivest Shamir Adleman (RSA) algorithm using parallel technique. …”
Get full text
Get full text
Get full text
Article -
19
A hybrid method for data communication using encrypted audio steganography
Published 2024journal::journal article -
20
A New Hybrid Image Encryption Technique Using Lorenz Chaotic System and Simulated Kalman Filter (SKF) Algorithm
Published 2022“…Nowadays, encryption is one of the most popular and effective security methods used by company and organizations. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
