Search Results - (( variable information security algorithm ) OR ( java application reoptimize algorithm ))
Search alternatives:
- application reoptimize »
- variable information »
- java application »
-
1
Hardware Implementation Of Rc4a Stream Cipher Algorithm
Published 2007“…The security of sensitive information against ‘prying eyes’ has been of prime concern throughout the centuries. …”
Get full text
Get full text
Thesis -
2
Optimization of medical image steganography using n-decomposition genetic algorithm
Published 2023“…To overcome these limitations, this study proposes a technique known as an n-decomposition genetic algorithm. This algorithm uses a variable-length search to identify the best location to embed the secret message by incorporating constraints to avoid local minimum traps. …”
Get full text
Get full text
Get full text
Thesis -
3
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…This creates challenges in developing secure Elliptic Curve Cryptography systems and performing cryptanalysis for scalar multiplication algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…This creates challenges in developing secure Elliptic Curve Cryptography systems and performing cryptanalysis for scalar multiplication algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…This creates challenges in developing secure Elliptic Curve Cryptography systems and performing cryptanalysis for scalar multiplication algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
An enhanced fingerprint template protection scheme
Published 2022“…Currently, most existing FTP schemes fail to meet the properties of fingerprint authentication systems, namely diversity, revocability, security, and match/recognition performance, due to intra-user variability in fingerprint identifiers and matching issues in unencrypted domains. …”
Get full text
Get full text
Thesis -
8
Hardware implementation of RC4A stream cipher
Published 2009“…Implementation of cryptographic algorithms on hardware runs faster than on software and at the same time offering more intrinsic security. …”
Get full text
Get full text
Get full text
Article -
9
Predicting wheat yield from 2001 to 2020 in Hebei Province at county and pixel levels based on synthesized time series images of Landsat and MODIS
Published 2024“…To obtain seasonable and precise crop yield information with fine resolution is very important for ensuring the food security. …”
Get full text
Get full text
Get full text
Article -
10
-
11
Performance evaluation of lightweight Crypto functions for Internet of things applications
Published 2020“…The conventional cryptography methods, such for Advanced Encryption Standard (AES), Secure Hash Algorithm (SHA) and Rivest–Shamir–Adleman, (RSA), work well on systems which have reasonable processing power and memory capabilities. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
-
13
Consumers' intention to use e-money mobile using the decomposed theory of planned behavior
Published 2016“…In particular, it is simultaneously assesses the determinants of consumers’ intention to use e-money mobile in Indonesia which examines twelve (12) variables. The variables are attitude, awareness, subjective norm, perceived behavioral control, perceived risk, perceived security, relative advantage, complexity, social-cultural influence, family, self-confidence, and resources facilitating conditions. …”
Get full text
Get full text
Get full text
Thesis -
14
-
15
Zero distortion-based steganography for handwritten signature
Published 2018Get full text
Get full text
Get full text
Thesis -
16
Power System State Estimation In Large-Scale Networks
Published 2010“…Its optimal performance is required in order to operate the power system in a safe, secure and economic manner. State estimators (SE) process the available measurements by taking into account the information about the network model and parameters. …”
Get full text
Get full text
Thesis -
17
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
Get full text
Get full text
Thesis -
18
A new integrated approach for evaluating sustainable development in the electric vehicle sector
Published 2025“…The truncated regression analysis shows that innovation performance in Taiwan's EV industry is significantly influenced by energy management, data security, employee information statistics, and control over equity and board seats. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
On line fault detection for transmission line using power system stabilizer signals
Published 2007“…It is a well known fact that power systems security is required to smooth power operations and planning. …”
Get full text
Get full text
Thesis -
20
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…Subsequently, NB+RF, a hybrid classification algorithm is used to distinguish similar and dissimilar content behaviours of a packet. …”
Get full text
Get full text
Thesis
