Search Results - parallel information ((selection algorithm) OR (encryption algorithm))
Search alternatives:
- parallel information »
- selection algorithm »
-
1
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
Get full text
Get full text
Thesis -
2
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007“…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
Get full text
Get full text
Conference or Workshop Item -
3
Improving security performance with parallel crypto operations in SSL bulk data transfer
Published 2009“…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
Get full text
Get full text
Get full text
Article -
4
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
5
-
6
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005Get full text
Get full text
Final Year Project -
7
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
Published 2012“…In addition, it uses two keys to encryption and decryption. However, this method needs to be develops and supports the protection of information. …”
Get full text
Get full text
Get full text
Thesis -
8
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003“…More specifically, these include encryption, decryption, authentication, digital signature algorithms and message-digest functions. …”
Get full text
Get full text
Thesis -
9
Implementation of a Symmetric Chaotic Encryption Scheme
Published 2004“…Due to the promising prospect ofchaotic encryption in the field ofcryptography, and the lack ofimplementation ofthis new encryption-decryption algorithm, this project focuses on introducing a new symmetric encryption-decryption scheme based on a chaos system for VoIP.…”
Get full text
Get full text
Final Year Project -
10
A comparative review on symmetric and asymmetric dna-based cryptography
Published 2023“…Current researchers have focused on DNA-based cryptography, in fact, DNA or deoxyribonucleic acid, has been applied in cryptography for performing computation as well as storing and transmitting information. In the present work, we made use of DNA in cryptographic, i.e. its storing capabilities (superior information density) and parallelism, in order to improve other classical cryptographic algorithms. …”
Article -
11
Automated plant recognition system based on multi-objective parallel genetic algorithm and neural network
Published 2014“…First, the best set of structures for feed forward neural network were found by multi objective parallel genetic algorithm. This approach regarded three criteria involving mean square error, Akaike information criterion and minimum description length to rate different feed forward neural network structures and to select the best set of them. …”
Get full text
Get full text
Thesis -
12
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…User is authorized to select and name any specified region from the image, and store the colour, brightness, size, and various kind of information together with the selected area as the individual characteristics for the particular region. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Unified GPU Technique to Boost Confidentiality, Integrity and Trim Data Loss in Big Data Transmission
Published 2020“…Moreover, multiple executions of distinct security algorithms for maintaining confidentiality and integrity reduce throughput and add a large number of additional bits as security overhead that hampers the robustness against data loss. …”
Get full text
Get full text
Article -
14
A scheduling algorithm for WDM optical networks
Published 2001Get full text
Get full text
Get full text
Article -
15
-
16
-
17
-
18
-
19
Projecting named entity tags from a resource rich language to a resource poor language
Published 2012“…Named Entities (NE) are the prominent entities appearing in textual documents.Automatic classification of NE in a textual corpus is a vital process in Information Extraction and Information Retrieval research. …”
Get full text
Get full text
Get full text
Article -
20
Projecting named entity tags from a resource rich language to a resource poor language
Published 2013“…Automatic classification of NE in a textual corpus is a vital process in Information Extraction and Information Retrieval research. …”
Get full text
Get full text
Article
