Search Results - based application differences ((encryption algorithm) OR (evolutionary algorithm))
Search alternatives:
- application differences »
- based application »
-
1
-
2
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
Get full text
Get full text
Get full text
Article -
3
-
4
Towards Software Product Lines Optimization Using Evolutionary Algorithms
Published 2019Get full text
Get full text
Proceeding Paper -
5
A shift column different offset for better Rijndael security
Published 2009Get full text
Get full text
Get full text
Article -
6
An efficient secure ECG compression based on 2D-SPIHT and SIT algorithm
Published 2017Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Image Encrytion Using Block Based Transformation Algorithm
Published 2008Get full text
Get full text
Get full text
Article -
8
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Advanced Encryption Standard (AES) was chosen as encryption algorithm and HMAC Standard Hash Algorithm 1 (SHA1) was chosen as HMAC algorithm. …”
Get full text
Get full text
Thesis -
9
-
10
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
11
-
12
Evolutionary mating algorithm
Published 2023Get full text
Get full text
Get full text
Get full text
Article -
13
Mobile game application development using evolutionary algorithms
Published 2014“…Hence it has opened up a whole new market with its mass among users and attracted a large number of smartphone application developers. Evolutionary Algorithms have never been used on mobile applications, thus it gives a novel idea of utilizing Evolutionary Algorithms in developing applications typically in games for mobile platforms. …”
Get full text
Get full text
Get full text
Thesis -
14
Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map
Published 2023“…The study provides a new chaos-based method and extends the application of the probabilistic approach to the domain of symmetric key image encryption. …”
Get full text
Get full text
Get full text
Article -
15
Selective video encryption algorithm based on H.264/AVC and AES
Published 2011Get full text
Get full text
Get full text
Book Chapter -
16
-
17
CHAOS AND PUBLIC KEY INFRASTRUCTURE (PKI)
Published 2004Get full text
Get full text
Final Year Project -
18
Application of Evolutionary Algorithm for Assisted History Matching
Published 2014“…In this project, we will define and discuss the application of evolutionary algorithm in assisted history matching. …”
Get full text
Get full text
Final Year Project -
19
Embedded PC based wireless communication using XTEA
Published 2010“…It focuses mainly on cryptography and its implementation in an embedded system. The Extended Tiny Encryption Algorithm (XTEA) is the chosen encryption method. …”
Get full text
Get full text
Undergraduates Project Papers -
20
