Search Results - data distribution ((((encryption algorithm) OR (detection algorithm))) OR (path algorithm))
Search alternatives:
- data distribution »
- path algorithm »
-
1
Secured route optimization in mobile IPv6 wireless networks in terms of data integrity
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm at a cost of a small increase in delay. …”
Get full text
Get full text
Conference or Workshop Item -
2
Energy-Aware Routing Hole Detection Algorithm in the Hierarchical Wireless Sensor Network
Published 2019“…In this paper a novel energy efficient routing hole detection (EEHD) algorithm is presented, on the detection of routing hole, the periodic re-clustering is performed to avoid the long detour path. …”
Get full text
Get full text
Get full text
Article -
3
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…This paper shows the results of processing time of data encryption between asymmetric key algorithm (RSA) and symmetric key algorithm (AES) which includes its key-distribution processing time with client’s public key (RSA) from small to large amount of data. …”
Get full text
Get full text
Get full text
Proceeding Paper -
4
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012“…The distribution of data will be based on the chosen percentages,which is entered by a sender.These percentages will be agreed between both the sender and the receiver as a key of hiding.The proposed system goal is to provide more complexity in encryption and make the embedding capacity as high as possible with high visible quality in a way that it does not allow any attacker to even detect that there are secret messages.The complexity of encryption and concealment was checked out with a number of widely used metrics such as Peak Signal to Noise Ratio(PSNR),Mean Squared Error(MSE), Normalized Absolute Error (NAE) and Normalized Correlation Coefficient (NCC).The experimental results demonstrate the complexity of the proposed method compared with the standard and existing methods.…”
Get full text
Get full text
Thesis -
5
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012“…The distribution of data will be based on the chosen percentages,which is entered by a sender.These percentages will be agreed between both the sender and the receiver as a key of hiding.The proposed system goal is to provide more complexity in encryption and make the embedding capacity as high as possible with high visible quality in a way that it does not allow any attacker to even detect that there are secret messages.The complexity of encryption and concealment was checked out with a number of widely used metrics such as Peak Signal to Noise Ratio(PSNR),Mean Squared Error(MSE), Normalized Absolute Error (NAE) and Normalized Correlation Coefficient (NCC).The experimental results demonstrate the complexity of the proposed method compared with the standard and existing methods.…”
Get full text
Get full text
Undergraduates Project Papers -
6
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
Published 2017“…AES is a data encryption technique that exist in the world with as currently the most secured algorithms. …”
Get full text
Get full text
Thesis -
7
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…This is useful for storing large amounts of data used in the cloud computing, the key distribution and authentication of the asymmetric encryption, speed, data integrity and data confidentiality of the symmetric encryption are also important also it enables to execute required computations on this encrypted data. � 2022 Institute of Advanced Engineering and Science. …”
Article -
8
Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network
Published 2019“…In the proposed work, the focused problem is how to reduce the communication energy consumption and to avoid the routing hole problem by optimized routing algorithms. First, a routing hole detection algorithm is proposed prior to designing the routing protocol which decreases about 30 percent energy consumption rate, detection time and detection overhead. …”
Get full text
Get full text
Thesis -
9
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
10
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
11
Chaos-based simultaneous compression and encryption for Hadoop
Published 2017“…Data compression and encryption are key components of commonly deployed platforms such as Hadoop. …”
Get full text
Get full text
Article -
12
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
Published 2019“…Furthermore, the attacks are detected and prevented by utilizing secure node authentication, data fragmentation algorithms, fully homomorphic encryption, and access control model. …”
Get full text
Get full text
Article -
13
-
14
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…During a security attack, the MTTD for the existing solution was very high because the existing scheme could not detect the attack. For the proposed scheme, the MTTD was very low which is 4.89 minutes, because of the consensus algorithm. …”
Get full text
Get full text
Thesis -
15
Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map
Published 2023“…Additionally, the Latin square matrix stands out for its uniform histogram distribution, thereby bolstering its encryption's potency. …”
Get full text
Get full text
Get full text
Article -
16
A Continuous Overlay Path Probing Algorithm For Overlay Networks
Published 2013“…Several experiments were carried out using the OMNeT++ simulation framework. The designed algorithm was evaluated using experimental data. The obtained results show that the continuous in-band overlay path probing algorithm (COPPA) provides up-to-date bandwidth information with reduced overhead and minimal impact on the traffic of the path.…”
Get full text
Get full text
Thesis -
17
An industrial IoT-based blockchain-enabled secure searchable encryption approach for healthcare systems using neural network
Published 2022“…In this paper, blockchain as a distributed database is proposed with a homomorphic encryption technique to ensure a secure search and keywords-based access to the database. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
18
A reliable time base routing framework with seamless networking operation for SDN / Nauman Khan
Published 2024“…PMTRF modules and their algorithms enable the isolation of the maintenance switch and the selection of the most reliable path for future affected flows based on input time provided by the administrator. …”
Get full text
Get full text
Get full text
Thesis -
19
Performance analysis of ZigBeePRO network using shortest path algorithm for Distributed Renewable Generation
Published 2021“…In this paper, we have analysed the performance of the ZigBeePRO network by applying the shortest path algorithm while delivering energy data from the solar DRG to the SG. …”
Get full text
Get full text
Article -
20
Security in robot operating system (ROS) by using Advanced Encryption Standard (AES)
Published 2018“…In particular, this research focuses on using encryption algorithm which is AES. The encryption algorithm will be evaluated according to the performance of the system, both from computing and communications point of view.…”
Get full text
Get full text
Get full text
Undergraduates Project Papers
