Arama Sonuçları - "Cryptanalysis"
Önerilen Konular
Önerilen Konular
- Computational Intelligence 13
- Computational intelligence 13
- Artificial Intelligence 10
- Artificial intelligence 10
- Communications Engineering, Networks 7
- Telecommunication 7
- Data and Information Security 6
- Data protection 6
- Signal processing 5
- Signal, Speech and Image Processing 5
- Applied Dynamical Systems 3
- Dynamics 3
- Nonlinear theories 3
- Data Mining and Knowledge Discovery 2
- Data Structures and Information Theory 2
- Data mining 2
- Data structures (Computer science) 2
- Information theory 2
- Application software 1
- Computer Communication Networks 1
- Computer and Information Systems Applications 1
- Computer networks 1
- Control and Systems Theory 1
- Control engineering 1
- Data processing 1
- Elementary Particles, Quantum Field Theory 1
- Elementary particles (Physics) 1
- Engineering 1
- Engineering mathematics 1
- Mathematical and Computational Engineering Applications 1
-
1
Proceedings of the Third International Afro-European Conference for Industrial Advancement - AECIA 2016
Baskı/Yayın Bilgisi 2018İçindekiler: “….- A Novel Ant Colony Optimization Based Cryptanalysis of Substitution Cipher.- Statistical modeling for improvement of numerical-model-based solar radiation forecasts.- A two-stage Feature Extraction Approach for ECG signals -- Contribution on character modelling for handwritten Arabic text recognition.…”
Full-text access
OPAC'ta görüntüle
e-Kitap -
2
Security in Smart Cities: Models, Applications, and Challenges
Baskı/Yayın Bilgisi 2019İçindekiler: “…Part I: Challenges of Smart Healthcare Applications -- Big Data challenges and opportunities in IoT Applications: Health Informatics and Smart Hospitals -- Healthcare Analysis in Smart Big Data Analytics :Reviews, Challenges and Recommendations -- Realization of IoT adaptive Data hiding system for Electronic Patient Record, Embedding in Medical Images -- A Swarm Intelligence Model for Enhancing Health Care Services in Internet of Things based Applications -- A Machine Learning Model for Predicting of Chronic Kidney Disease for Internet of Things and cloud computing Applications -- Part II: Secure Models for Smart Cities Applications -- Data Security Challenges in Smart cities -- Engineering Large Complex Critical Infrastructures of Future Smart Cities for IoT applications as Self-Adaptive Systems- Security challenges in IoT Cyber world -- Blockchains for Smart Cities: A Survey -- A Review of Existing 4-bit Crypto S-box cryptanalysis Techniques and Two New Techniques with 4-bit Boolean Functions for Cryptanalysis of 4-bit Crypto S-boxes towards a Secure Internet of Things based Application -- Part III: Secure Network Communication in Smart Cities Applications -- A Robust Watermarking Scheme Using Machine Learning Transmitted Over High-Speed Net-work for Internet of Things Applications -- 4, 8, 32, 64 bit Substitution Box generation using Irreducible or Reducible Polynomials over Galois Field GF(pq) -- Local Binary Patterns for Facial Expression Recognition for Efficient Smart Applications -- Efficient Generation of Association Rules from Numeric Data using Genetic Algorithm for Smart Cities Applications -- Online User Authentication System based on Finger Knuckle Print using Smartphones.…”
Full-text access
OPAC'ta görüntüle
e-Kitap -
3
Proceedings of International Ethical Hacking Conference 2018 eHaCON 2018, Kolkata, India /
Baskı/Yayın Bilgisi 2019İçindekiler: “…Chapter 1.Social Engineering Attack Detection and Data Protection Model (SEADDPM) -- Chapter 2.OnlineKALI: Online Vulnerability Scanner -- Chapter 3.Towards an AI-Chatbot driven Advanced Digital Locker -- Chapter 4.A hybrid task scheduling algorithm for efficient task management in multi cloud environment -- Chapter 5.An Enhanced Post Migration Algorithm for Dynamic Load Balancing in Cloud Computing Environment -- Chapter 6.Cryptanalysis and Improvement of Three-Factor-Based Confidentiality-Preserving Remote User Authentication Scheme in Multi-server Environment -- Chapter 7.Bi-Symmetric Key Exchange: A Novel Cryptographic Key Exchanging Algorithm -- Chapter 8.DNA Cryptography Based Secured Weather Prediction Model in High Performance Computing -- Chapter 9.A Novel Approach of Image Steganography with Encoding and Location Selection -- Chapter 10.Image Encryption using Pseudorandom Permutation.-..etc.…”
Full-text access
OPAC'ta görüntüle
e-Kitap -
4
Emerging Technologies in Data Mining and Information Security Proceedings of IEMIS 2018, Volume 3 /
Baskı/Yayın Bilgisi 2019İçindekiler: “…Proposed Memory Allocation Algorithm for NUMA based Soft Real Time Operating System -- Mathematical Model of Fog Computing Architecture for IoT Micro-Services -- Analysis of Attention Level of Human Body in Different Form -- Analytical Survey on Standards of Internet of Things Framework & Platforms -- A Predictive Resource Management Technique in Grid -- Cryptanalysis of a Chaotic Key based Image Encryption Scheme -- Blind RGB Image Steganography using Discrete Cosine Transformation -- Wavelet and Pyramid Histogram Features for Image based Leaf Detection -- Automated Detection of Glaucoma using Image Processing Techniques -- Chemical Reaction Optimization Algorithm for Word Detection using Pictorial Structure -- Secure Remote Patient Monitoring with Location Based Services -- Development of Joint Intelligent Millimeter Wave Sensing and Communication -- Machine Learning for Mining Imbalanced Data -- Key Feature Extraction and Machine Learning Based Automatic Text Summarization -- Prediction of Gold Price Movement Using Geopolitical Risk as a Factor.…”
Full-text access
OPAC'ta görüntüle
e-Kitap -
5
Information Systems Design and Intelligent Applications Proceedings of Fifth International Conference INDIA 2018 Volume 2 /
Baskı/Yayın Bilgisi 2019İçindekiler: “…Chapter 1: Integrating information technology and marketing for better customer value -- Chapter 2: Use of Social Media for improving student engagement at Université des Mascareignes (UDM) -- Chapter 3: Conceptualising an online resource platform for business students at Université des Mascareignes -- Chapter 4: Development of an Incident Prioritization Model using Fuzzy Logic to Improve Quality and Productivity in IT Support Services -- Chapter 5: Automatic Text-Independent Kannada Dialect Identification System -- Chapter 6: HECMI: Hybrid Ensemble technique for Classification of Multiclass Imbalanced data -- Chapter 7: Dolphin Swarm Algorithm for Cryptanalysis -- Chapter 8: A Secured Communication Model for IoT -- Chapter 9: An Exploratory Study of Evidence-Based Clinical Decision Support Systems -- Chapter 10: Modelling the effects of wind farming on the local weather using Weather Research and Forecasting (WRF) model -- Chapter 11: Evaluation of Cloud Computing Adoption using a Hybrid TAM/TOE Model -- Chapter 12: Measuring the influence of moods on stock market using Twitter Analysis -- Chapter 13: Hand Gestures Categorisation and Recognition.…”
Full-text access
OPAC'ta görüntüle
e-Kitap -
6
Security with Intelligent Computing and Big-data Services
Baskı/Yayın Bilgisi 2018Full-text access
OPAC'ta görüntüle
e-Kitap -
7
-
8
Soft Computing: Theories and Applications Proceedings of SoCTA 2017 /
Baskı/Yayın Bilgisi 2019Full-text access
OPAC'ta görüntüle
e-Kitap -
9
International Conference on Wireless, Intelligent, and Distributed Environment for Communication WIDECOM 2018 /
Baskı/Yayın Bilgisi 2018İçindekiler: “…Chapter1: Tamper Detection Using Fragile Image Watermarking Based on Chaotic System -- Chapter2: Cryptanalysis and Improvement of a User Authentication Scheme for SIP -- Chapter3: SECURITY AGAINST VAMPIRE ATTACK IN ADHOC WIRELESS SENSOR NETWORK: DETECTION & PREVENTION TECHNIQUES -- Chapter4: Securing Fuzzy Commitment Scheme against Decodability Attack based Cross-matching -- Chapter5: PiFallD: A Portable Fall Detection System -- Chapter6: Analysing, Designing, Implementation and Coding E-commerce through UX -- Chapter7: Performance evaluation of GAER over various crossover techniques in opportunistic networks -- Chapter8: Software Performance Measuring Benchmarks.…”
Full-text access
OPAC'ta görüntüle
e-Kitap -
10
Mathematical Modelling for Next-Generation Cryptography CREST Crypto-Math Project /
Baskı/Yayın Bilgisi 2018Full-text access
OPAC'ta görüntüle
e-Kitap -
11
Advances in Soft and Hard Computing
Baskı/Yayın Bilgisi 2019İçindekiler: “…Quality Control and Interaction Procedure of Service Subsystems -- Validation of Safety-Like Properties for Entity-Based Access Control Policies -- Randomness Evaluation of PP-1 and PP-2 Block Ciphers Round Keys Generators -- New Results in Direct SAT-based Cryptanalysis of DES-like Ciphers -- Secure Generators of q-valued Pseudo-random Sequences on Arithmetic Polynomials -- A Hybrid Approach to Fault Detection in One Round of PP-1 Cipher -- Protection of Information from Imitation on the Basis of Crypt-code -- On a New Intangible Reward for Card-Linked Loyalty Programs -- KaoChow Protocol Timed Analysis -- Electronic Document Interoperability in Transactions Executions -- L-system Application to Procedural Generation of Room Shapes for 3D Dungeon Creation in Computer Games -- Hardware-Efficient Algorithm for 3D Spatial Rotation -- Driver Drowsiness Estimation by Means of Face Depth Map Analysis -- Vehicle Passengers Detection for Onboard eCall-Compliant Devices -- An Algorithm for Computing the True Discrete Fractional Fourier Transform -- Region Based Approach for Binarization of Degraded Document Images -- Partial Face Images Classification Using Geometrical Features -- A Method of Feature Vector Modification in Keystroke Dynamics -- Do-It-Yourself Multi-material 3D Printer for Rapid Manufacturing of Complex Luminaries -- Multichannel Spatial Filters for Enhancing SSVEP Detection.…”
Full-text access
OPAC'ta görüntüle
e-Kitap -
12
Soft Computing: Theories and Applications Proceedings of SoCTA 2016, Volume 1 /
Baskı/Yayın Bilgisi 2018Full-text access
OPAC'ta görüntüle
e-Kitap -
13
Soft Computing: Theories and Applications Proceedings of SoCTA 2016, Volume 2 /
Baskı/Yayın Bilgisi 2018Full-text access
OPAC'ta görüntüle
e-Kitap -
14
Information and Decision Sciences Proceedings of the 6th International Conference on FICTA /
Baskı/Yayın Bilgisi 2018İçindekiler: “…Group Recommender Systems-Evolutionary Approach based on consensus with ties -- 38. Cryptanalysis of Image Cryptosystem Using Synchronized 4D Lorenz Stenflo Hyperchaotic Systems -- 39. …”
Full-text access
OPAC'ta görüntüle
e-Kitap -
15
Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015
Baskı/Yayın Bilgisi 2016İçindekiler: “…Part 1: Special Session: Advances in Nature Inspired Algorithms for Engineering Optimization Problems_An Efficient Dynamic Scheduling Algorithm for Soft Real-Time Task in Multiprocessor System Using Hybrid Quantum-Inspired Genetic Algorithm -- Equitable Machine Learning Algorithms to Probe over P2P Botnets -- Directed Search Based PSO Algorithm and Its Application to Scheduling Independent Task in Multiprocessor Environment -- Part 2: Bioinformatics and Computational Biology_JUPred_MLP: Prediction of Phosphorylation Sites Using a Consensus of MLP Classifiers -- Molecular Computing and Structural Biology for Interactions in ERα and bZIP Proteins from Homo Sapiens: An Insight into the Signal Transduction in Breast Cancer Metastasis -- SVM Based Pre-microRNA Classifier Using Sequence, Structural and Thermodynamic Parameters -- DCoSpect: A Novel Differentially Co-expressed Gene Module Detection Algorithm Using Spectral Clustering -- Intelligent Topological Differential Gene Networks -- Part 3: Signal Processing_Impact of Threshold to Identify Vocal Tract -- Application of Compressed Sensing in Cognitive Radio -- Compressed Sensing Based NBI Mitigation in Ultra Wide Band Energy Detector -- Part 4: Data Mining_A Novel Data Mining Scheme for Smartphone Activity Recognition by Accelerometer Sensor -- Mining and Ranking Association Rules in Support, Confidence, Correlation and Dissociation Framework -- Mining Closed Interesting Sub spaces to Discover Conducive Living Environment of Migratory Animals -- Frequent Patterns Mining from Data Cube Using Aggregation and Directed Graph -- Part 5: Document Image Analysis_A Modified Parallel Thinning Method for Handwritten Oriya Character Images -- Offline Signature Verification Using Artificial Neural Network -- A Simple and Effective Technique for Online Handwritten Bangla Character Recognition -- Visual Analytic Based Technique for Handwritten Indic Script Identification - A Greedy Heuristic Feature Fusion Framework -- Offline Writer Identification from Isolated Characters Using Textural Features -- PWDB_13: A Corpus of Word-level Printed Document Images from Thirteen Official Indic Scripts -- Part 6: Applications of Metaheuristic Optimization_Application of Krill Herd Algorithm for Optimum Design of Load Frequency Controller for Multi-Area Power System Network with Generation Rate Constraint -- Optimal allocation of Distributed Generator using Chemical Reaction Optimization -- A Novel Combined Approach of k-means and Genetic Algorithm to Cluster Cultural Goods in Household Budget -- A PSO with improved initialization operator for solving Multiple Sequence Alignment Problems -- Profit Maximization of TSP with uncertain Parameters through a Hybrid Algorithm -- Part 7: Wireless Sensor and Ad-hoc Networks_Mitigating Packet Dropping Problem and Malicious Node Detection Mechanism in Ad Hoc Wireless Networks -- Service Provisioning middleware for Wireless Sensor Network -- A Novel MTC-RB Heuristic for Addressing Target Coverage Problem in Heterogeneous Wireless Sensor Network -- Part 8: Quantum dot Cellular Automata_2 Dimensional 2 Dot 1 Electron Quantum Cellular Automata Based Dynamic Memory Design -- Optimized Approach for Reversible Code Converters Using Quantum Dot Cellular Automata -- Design of a Logically Reversible Half Adder using 2D 2-Dot 1-Electron QCA -- Part 9: Fuzzy Sets and Systems_Intuitionistic Fuzzy Multivalued Dependency and Intuitionistic Fuzzy Fourth Normal Form -- Parameter Reduction of Intuitionistic Fuzzy Soft Sets and Its Related Algorithms -- Correlation Measure of Hesitant Fuzzy Linguistic Term Soft Set and Its Application in Decision Making -- Constrained Solid Travelling Salesman Problem Solving by Rough GA Under Bi-fuzzy Coefficients -- Part 10: Routing and Traffic Grooming_A Novel Multi-criteria Multi-agent Based Routing Strategy Based on Tarantula Mating Behaviour -- A Mesh Based Multicast Routing Protocol using Reliable Neighbor Node for Wireless Mobile Ad-Hoc Networks -- Traffic Grooming in Hybrid Optical-WiMAX Mesh Networks -- Part 11: Authentication and Network Security_Host Based Intrusion Detection Using Statistical Approaches -- Secure Remote Login Scheme with Password and Smart Card Update Facilities -- Generation and Risk Analysis of Network Attack Graph -- Unsupervised Spam Detection in Hyves Using SALSA -- Cryptanalysis of a Chaotic Map Based Authentication and Key Agreement Scheme for Telecare Medicine Information Systems -- Improving the Accuracy of Intrusion Detection Using GAR-Forest with Feature Selection -- Part 12: Text Processing_Sentiment Analysis with Modality Processing -- Query-Based Extractive Text Summarization for Sanskrit -- Code Obfuscation by Using Floating Points and Conditional Statements -- Privacy Preserving Spam Email Filtering Based on Somewhat Homomorphic Using Functional Encryption -- Part 13: Image Processing_Digital Image Watermarking Scheme based on Visual Cryptography and SVD -- Compression of Hyper-Spectral Images and Its Performance Evaluation -- Hand Gesture Recognition for Sign Language: A Skeleton Approach -- Modified Cuckoo Searchbased Image Enhancement -- A Novel Iterative Salt-and-Pepper Noise Removal Algorithm -- Part 14: Intelligent System Planning_Queuing Model for Improving QoS in Cloud Service Discovery -- Adaptive Multi-Layer Routing for Incremental Design of an SoC -- Analyzing and Modelling Spatial Factors for Pre-decided Route Selection Behaviour -- Fault Tolerant Scheduling with Enhanced Performance for Onboard Computers-Evaluation -- A Multi-Agent Planning Algorithm with Joint Actions -- 4-Directional Combinatorial Motion Planning via Labeled Isotonic Array P System -- Intelligent Control of DFIG Using Sensorless Speed Estimation and Lookup Table based MPPT Algorithm to overcome Wind and Grid disturbances.…”
Full-text access
OPAC'ta görüntüle
e-Kitap -
16
Proceedings of the International Congress on Information and Communication Technology ICICT 2015, Volume 2 /
Baskı/Yayın Bilgisi 2016İçindekiler: “…Network Performance analysis of Start-up Buffering for Live Streaming in P2P VOD Systems for Mesh Based Topology -- Chapter 31. Cryptanalysis of Image Encryption Algorithms Based on Pixels-Shuffling and Bits-Shuffling -- Chapter 32. …”
Full-text access
OPAC'ta görüntüle
e-Kitap -
17
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications FICTA 2016, Volume 2 /
Baskı/Yayın Bilgisi 2017İçindekiler: “…An Efficient Detection and Mitigation of Selfish and Black Hole Attack in Cognitive Mobile Ad-hoc Network -- Chapter 69. Cryptanalysis of Secure Routing among Authenticated Nodes in MANETs -- Chapter 70. …”
Full-text access
OPAC'ta görüntüle
e-Kitap