Search Results - parallel information security algorithm*

  • Showing 1 - 16 results of 16
Refine Results
  1. 1

    Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm by Mohammed Alaidaros, Hashem

    Published 2007
    “…The existing sequential and the proposed parallel algorithms were simulated successfully while preserving security properties. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase by Alaidaros, Hashem Mohammed, A. Rasid, Mohd Fadlee, Othman, Mohamed, Raja Abdullah, Raja Syamsul Azmir

    Published 2007
    “…Despite a number of secure algorithms that have been proposed, the trade-offs made between security and performance demands further research toward improvement. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Improving security performance with parallel crypto operations in SSL bulk data transfer by Alaidaros, Hashem Mohammed, Othman, Mohamed, A. Rasid, Mohd Fadlee

    Published 2009
    “…Despite a number of secure algorithms that have been proposed, the trade-offs made between security and performance demands further research toward improvement. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    Enhancing speed performance of the cryptographic algorithm based on the lucas sequence by M. Abulkhirat, Esam

    Published 2003
    “…Reducing the calculation time of the algorithm, in sequential and parallel platforms, using the doubling-rule technique combined with a new scheme led to a strong improvement of the LUC algorithm speed. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A review on security and privacy issues in E-learning and the MapReduce aproach by Noor Akma, Abu Bakar, Mazlina, Abdul Majid, Khalid, Adam, Kirahman, Ab Razak, Noorhuzaimi@Karimah, Mohd Noor

    Published 2019
    “…Then, we proposed e-Learning using MapReduce algorithm in protecting the security and privacy of eLearning. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    Implementation of a Symmetric Chaotic Encryption Scheme by Sivanandan, Easwari

    Published 2004
    “…Due to its deterministic nature and its sensitivity to initial conditions, chaos has a certain potential in creating a newway of securing information to be transmitted or stored. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Unified GPU Technique to Boost Confidentiality, Integrity and Trim Data Loss in Big Data Transmission by Bhattacharjee, S., Rahim, L.B.A., Watada, J., Roy, A.

    Published 2020
    “…Moreover, multiple executions of distinct security algorithms for maintaining confidentiality and integrity reduce throughput and add a large number of additional bits as security overhead that hampers the robustness against data loss. …”
    Get full text
    Get full text
    Article
  12. 12

    FPGA-based Implementation of SHA-256 with Improvement of Throughput using Unfolding Transformation by Shamsiah, Suhaili, Norhuzaimin, Julai

    Published 2022
    “…Several cryptographic algorithms have been created to increase the performance of these information-protecting methods. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    On line fault detection for transmission line using power system stabilizer signals by Ali Falifla, Hamza AbuBeker

    Published 2007
    “…Hence, this study will show that not only the PSS able to compensate the damping due to the disturbance but also by using the developed algorithm it succeeds to detect and classify the fault conditions on the parallel transmission lines.…”
    Get full text
    Get full text
    Thesis
  14. 14

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The new replication process will also be used in e-commerce application to secure user transaction information. The motivation of implementation is to make sure the data replication is easy to maintain and cost effective. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16