Search Results - addition make difference ((evolution algorithm) OR (encryption algorithm))

Search alternatives:

  • Showing 1 - 10 results of 10
Refine Results
  1. 1
  2. 2

    Efficient dynamic DNA-based block cipher algorithm by Chng, Chern Wei

    Published 2023
    “…The DNA-based MixColumns operation functions as a pseudo-random number generator, generating an encrypted random number for the purpose of encryption. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Mathematical modelling on communication between two parties / Nor Anees Asyiqin Md Disa, Khairunnisa Munawarah Khairul Anwar and Aniesa Farhana Mazlan by Md Disa, Nor Anees Asyiqin, Khairul Anwar, Khairunnisa Munawarah, Mazlan, Aniesa Farhana

    Published 2022
    “…This descriptive-analytical was resolved using the formulation of the study such as point addition, point doubling and double-and-add algorithm. …”
    Get full text
    Get full text
    Student Project
  4. 4

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network by Sama, Najm Us

    Published 2019
    “…In multi hop communication, the Cluster Head (CH) has to send the aggregated data to one hop away neighbor cluster head either it is far away or near to the sink, while in a single hop it makes a difference. Due to many-to-one data routing pattern, lack of energy consumption management will results early loss of CH’s energy in sink vicinity, which leads to a routing hole problem. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A novel framework for secure cryptocurrency transactions using quantum crypto guard by Jamil Alsayaydeh, Jamil Abedalrahim, Yusof, Mohd Faizal, Yahaya, Nor Adnan, Kovtu, Viacheslav, Herawan, Safarudin Gazali

    Published 2025
    “…However, the rise of quantum computing poses significant threats to their security, as traditional cryptographic methods may be easily compromised. In addition, the existing algorithms face difficulties like slow transaction speeds, interoperability issues between different cryptocurrencies, and privacy concerns. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    The Rise of Blockchain Internet of Things (BIoT): Secured, Device-to-Device Architecture and Simulation Scenarios by Arun Rana, Sharad Sharma, Kashif Nisar, Ag. Asri Ag. Ibrahim, Sachin Dhawan, Bhawani Chowdhry, Samreen Hussain, Nitin Goyal

    Published 2022
    “…IoT devices, such as smartphones and tablets, have a limited network, computation, and storage capacity, making them more vulnerable to attacks. In addition, the huge volume of data generated by IoT devices remains an open challenge for existing platforms to process, analyze, and discover underlying trends to create a convenient environment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    End to end performance analysis over IP RAN network / Armi Shahran Mohamad by Mohamad, Armi Shahran

    Published 2011
    “…For future research, similar scientific analysis will be deploy on Long Term Evolution Network (4G) which is focusing on scheduling algorithms in different traffic conditions such as VoIP and Mix Traffic (Web Browsing, FTP & Steaming).…”
    Get full text
    Get full text
    Thesis
  10. 10