نتایج جستجو برای: enhancement of security structures

تعداد نتایج: 21213857  

Journal: :International Journal of Computers Communications & Control 2016

Journal: :Journal of Engineering and Applied Sciences 2019

2012
M. Suganthy P. Ramamoorthy R. Krishnamoorthy

Iris Recognition is considered as one of the best Biometric methods used for human identification and verification, because of its unique feature that differ from one person to another, and its importance in the security field. We proposed an algorithm using a system based on Local Binary Pattern and histogram approaches for feature extraction, and Linear Vector Quantization classifier for clas...

2013
Kamal Garg

Wired Equivalent Privacy (WEP) is an IEEE 802.11 standard implemented to provide security to data transmitted on wireless networks. In this paper we enhance the WEP security by improving the authenticity, integrity and confidentiality mechanisms. WEP uses static 40 bit as pre-shared secret key for pseudo noise sequence generation. Our method uses dynamic key which keeps changing time to time de...

2011
V. Anil Kumar

Security has become one of the major issues for data communication over wired and wireless networks. Different from the past work on the designs of network security algorithms and system infrastructures, we will propose a dynamic broadcast routing algorithm that could randomize delivery paths for data transmission. The algorithm is easy to implement and compatible with popular routing protocols...

2006
Manoj A. Thomas Gurpreet Dhillon

Companies tend to adopt security approaches that align with some subset of the four categories of IS security techniques checklists, risk analysis, formal methods and soft modeling. To develop a structure of secure IS that upholds confidentiality, integrity and availability of information there remains a need for an integral security model that incorporates the benefits of other security design...

Journal: :International Journal of Computer Applications 2015

Journal: :Indonesian Journal of Electrical Engineering and Computer Science 2021

Data <span>encryption process and key generation techniques protect sensitive data against any various attacks. This paper focuses on generating secured cipher keys to raise the level of security speed integrity checking by using MinHash function. The methodology is based applying cryptographic algorithms rivest-shamir-adleman (RSA) advanced encryption standard (AES) generate keys. These ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید