Search Results - (( variable information security algorithm ) OR ( java application reoptimize algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Hardware Implementation Of Rc4a Stream Cipher Algorithm by Al Noman, Abdullah

    Published 2007
    “…The security of sensitive information against ‘prying eyes’ has been of prime concern throughout the centuries. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Optimization of medical image steganography using n-decomposition genetic algorithm by Al-Sarayefi, Bushra Abdullah Shtayt

    Published 2023
    “…To overcome these limitations, this study proposes a technique known as an n-decomposition genetic algorithm. This algorithm uses a variable-length search to identify the best location to embed the secret message by incorporating constraints to avoid local minimum traps. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Cryptanalysis of elliptic curve scalar multiplication algorithms by Leong, Zhen Hong

    Published 2025
    “…This creates challenges in developing secure Elliptic Curve Cryptography systems and performing cryptanalysis for scalar multiplication algorithms. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4
  5. 5

    Cryptanalysis of elliptic curve scalar multiplication algorithms by Leong, Zhen Hong

    Published 2025
    “…This creates challenges in developing secure Elliptic Curve Cryptography systems and performing cryptanalysis for scalar multiplication algorithms. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Cryptanalysis of elliptic curve scalar multiplication algorithms by Leong, Zhen Hong

    Published 2025
    “…This creates challenges in developing secure Elliptic Curve Cryptography systems and performing cryptanalysis for scalar multiplication algorithms. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    An enhanced fingerprint template protection scheme by Siswanto, Apri

    Published 2022
    “…Currently, most existing FTP schemes fail to meet the properties of fingerprint authentication systems, namely diversity, revocability, security, and match/recognition performance, due to intra-user variability in fingerprint identifiers and matching issues in unencrypted domains. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Hardware implementation of RC4A stream cipher by Al Noman, Abdullah, Mohd Sidek, Roslina, Ramli, Abdul Rahman

    Published 2009
    “…Implementation of cryptographic algorithms on hardware runs faster than on software and at the same time offering more intrinsic security. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    Performance evaluation of lightweight Crypto functions for Internet of things applications by Jaleel, Nubila, Habaebi, Mohamed Hadi, Islam, Md Rafiqul

    Published 2020
    “…The conventional cryptography methods, such for Advanced Encryption Standard (AES), Secure Hash Algorithm (SHA) and Rivest–Shamir–Adleman, (RSA), work well on systems which have reasonable processing power and memory capabilities. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Consumers' intention to use e-money mobile using the decomposed theory of planned behavior by Husnil, Khatimah

    Published 2016
    “…In particular, it is simultaneously assesses the determinants of consumers’ intention to use e-money mobile in Indonesia which examines twelve (12) variables. The variables are attitude, awareness, subjective norm, perceived behavioral control, perceived risk, perceived security, relative advantage, complexity, social-cultural influence, family, self-confidence, and resources facilitating conditions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Power System State Estimation In Large-Scale Networks by NURSYARIZAL MOHD NOR, NURSYARIZAL

    Published 2010
    “…Its optimal performance is required in order to operate the power system in a safe, secure and economic manner. State estimators (SE) process the available measurements by taking into account the information about the network model and parameters. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A new integrated approach for evaluating sustainable development in the electric vehicle sector by Lu, Wen Min, Chou, Chienheng, Ting, Irene Wei Kiong, Liu, Shangming

    Published 2025
    “…The truncated regression analysis shows that innovation performance in Taiwan's EV industry is significantly influenced by energy management, data security, employee information statistics, and control over equity and board seats. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    On line fault detection for transmission line using power system stabilizer signals by Ali Falifla, Hamza AbuBeker

    Published 2007
    “…It is a well known fact that power systems security is required to smooth power operations and planning. …”
    Get full text
    Get full text
    Thesis
  20. 20

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…Subsequently, NB+RF, a hybrid classification algorithm is used to distinguish similar and dissimilar content behaviours of a packet. …”
    Get full text
    Get full text
    Thesis