Academic literature on the topic 'To ensure the security analysis of the algorithm'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'To ensure the security analysis of the algorithm.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "To ensure the security analysis of the algorithm"
Gong, Qianru. "Application Research of Data Encryption Algorithm in Computer Security Management." Wireless Communications and Mobile Computing 2022 (July 14, 2022): 1–7. http://dx.doi.org/10.1155/2022/1463724.
Full textFasila, Kasfa Ali, and Mathew Sheena. "An efficient lightweight key exchange algorithm for internet of things applications." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 5 (2022): 5609–18. https://doi.org/10.11591/ijece.v12i5.pp5609-5618.
Full textSevin, Abdullah, and Ünal Çavuşoğlu. "Design and Performance Analysis of a SPECK-Based Lightweight Hash Function." Electronics 13, no. 23 (2024): 4767. https://doi.org/10.3390/electronics13234767.
Full textYang, Er Song, Lin You, Zhen Dong Wu, and Wang Ke Yu. "Massive Data Hybrid Encryption Algorithm Based on Cloud Computing." Applied Mechanics and Materials 651-653 (September 2014): 1864–67. http://dx.doi.org/10.4028/www.scientific.net/amm.651-653.1864.
Full textKasfa Ali, Fasila, and Sheena Mathew. "An efficient lightweight key exchange algorithm for internet of things applications." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 5 (2022): 5609. http://dx.doi.org/10.11591/ijece.v12i5.pp5609-5618.
Full textMuhammad, Aina’u Shehu, and Fatih Özkaynak. "SIEA: Secure Image Encryption Algorithm Based on Chaotic Systems Optimization Algorithms and PUFs." Symmetry 13, no. 5 (2021): 824. http://dx.doi.org/10.3390/sym13050824.
Full textSholikhatin, Siti Alvi, Adam Prayogo Kuncoro, Afifah Lutfia Munawaroh, and Gilang Aji Setiawan. "Comparative Study of RSA Asymmetric Algorithm and AES Algorithm for Data Security." Edu Komputika Journal 9, no. 1 (2023): 60–67. http://dx.doi.org/10.15294/edukomputika.v9i1.57389.
Full textHarfoushi, Osama, and Ruba Obiedat. "Security in Cloud Computing Using Hash Algorithm: A Neural Cloud Data Security Model." Modern Applied Science 12, no. 6 (2018): 143. http://dx.doi.org/10.5539/mas.v12n6p143.
Full textSantoso, Zikri Akmal, Mohammad Andri Budiman, and Syahril Efendi. "A Hybrid Cryptosystem Using Rprime RSA And Extended Tiny Encryption (XTEA) For Securing Message." Data Science: Journal of Computing and Applied Informatics 9, no. 1 (2025): 18–31. https://doi.org/10.32734/jocai.v9.i1-16574.
Full textChen, Runyu, Lunwen Wang, Chuang Peng, and Rangang Zhu. "An Effective Sharding Consensus Algorithm for Blockchain Systems." Electronics 11, no. 16 (2022): 2597. http://dx.doi.org/10.3390/electronics11162597.
Full textDissertations / Theses on the topic "To ensure the security analysis of the algorithm"
Nashwan, Shadi Ismail. "Performance analysis of a new dynamic authentication protocol DAKA of 3G mobile systems based on a novel Cryptography algorithm 'Anglia'." Thesis, Anglia Ruskin University, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.492950.
Full textChhabra, Dalbir Kaur R. "Feature selection and clustering for malicious and benign software characterization." ScholarWorks@UNO, 2014. http://scholarworks.uno.edu/td/1864.
Full textHitchcock, Yvonne Roslyn. "Elliptic curve cryptography for lightweight applications." Thesis, Queensland University of Technology, 2003. https://eprints.qut.edu.au/15838/1/Yvonne_Hitchcock_Thesis.pdf.
Full textHitchcock, Yvonne Roslyn. "Elliptic Curve Cryptography for Lightweight Applications." Queensland University of Technology, 2003. http://eprints.qut.edu.au/15838/.
Full textFujdiak, Radek. "Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice." Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-358408.
Full textLee, Chung-Cheng, and 李崇誠. "Multi-Devices Correlation Algorithm in Large Scale Security Analysis Platform." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/55123795563899309386.
Full textTsai, Yun-Feng, and 蔡勻豐. "Security Analysis and a Fast Algorithm for the Implementation of Gollmann Cascades Pseudorandom Number Generator." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/74865432684455768754.
Full textChen, Gen-Li, and 陳俊利. "The Analysis of Data Security in Wired Equivalent Privacy Algorithm for Wireless Local Area Network." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/19874938019416317909.
Full textShortt, Caleb James. "Hermes: A Targeted Fuzz Testing Framework." Thesis, 2015. http://hdl.handle.net/1828/5907.
Full textNakai, Eduardo Yuzo. "Evaluation and implementation of the Ed25519 digital signature algorithm in rust." Master's thesis, 2021. http://hdl.handle.net/10198/24067.
Full textBooks on the topic "To ensure the security analysis of the algorithm"
Mironov, A., and S. Zubarev. Interaction of law enforcement agencies to ensure national security. INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1860938.
Full textservice), SpringerLink (Online, ed. Transactions on Data Hiding and Multimedia Security VII. Springer Berlin Heidelberg, 2012.
Find full textDamgrd, Ivan Bjerre. Lectures on Data Security: Modern Cryptology in Theory and Practice. Springer-Verlag Berlin Heidelberg, 1999.
Find full textSteven, Furnell, Theoharidou Marianthi, and SpringerLink (Online service), eds. Information Security and Privacy Research: 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings. Springer Berlin Heidelberg, 2012.
Find full textHanaoka, Goichiro. Advances in Information and Computer Security: 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings. Springer Berlin Heidelberg, 2012.
Find full textCatuscia, Palamidessi, and SpringerLink (Online service), eds. Theory of Security and Applications: Joint Workshop, TOSCA 2011, Saarbrücken, Germany, March 31 - April 1, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2012.
Find full textSahai, Amit. Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings. Springer Berlin Heidelberg, 2013.
Find full textBruno, Crispo, Malcolm James, Stajano Frank, and SpringerLink (Online service), eds. Security Protocols XIX: 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2011.
Find full textUnited States. General Accounting Office., ed. Army force structure: Attention needed to ensure an ample supply of ready support forces : statement of Richard Davis, Director, National Security Analysis, National Security and International Affairs Division, before the Subcommittee on Military Forces and Personnel, Committee on Armed Services, House of Representatives. The Office, 1993.
Find full textA, Huss Sorin, and SpringerLink (Online service), eds. Constructive Side-Channel Analysis and Secure Design: Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings. Springer Berlin Heidelberg, 2012.
Find full textBook chapters on the topic "To ensure the security analysis of the algorithm"
Poonia, Ramesh Chandra, Kamal Upreti, Bosco Paul Alapatt, and Samreen Jafri. "Real-Time Cyber-Physical Risk Management Leveraging Advanced Security Technologies." In Lecture Notes in Networks and Systems. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-4581-4_25.
Full textLachnitt, Hanna, Mathias Fleury, Leni Aniva, et al. "IsaRare: Automatic Verification of SMT Rewrites in Isabelle/HOL." In Tools and Algorithms for the Construction and Analysis of Systems. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-57246-3_17.
Full textMoosavi, Sanaz Rahimi, and Arman Izadifar. "End-to-End Security Scheme for E-Health Systems Using DNA-Based ECC." In Silicon Valley Cybersecurity Conference. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96057-5_6.
Full textSim, Sang Gyoo, Dong Jin Park, and Pil Joong Lee. "New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm." In Information and Communications Security. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30191-2_23.
Full textPinel, Frédéric, Grégoire Danoy, and Pascal Bouvry. "Evolutionary Algorithm Parameter Tuning with Sensitivity Analysis." In Security and Intelligent Information Systems. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-25261-7_16.
Full textLi, Bentu. "Genetic Algorithm in Ginzburg-Landau Equation Analysis System." In Cyber Security Intelligence and Analytics. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-31775-0_27.
Full textZheng, Yujie. "KNN Algorithm Analysis Based on Big Data Classification." In Cyber Security Intelligence and Analytics. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97874-7_148.
Full textTian, Fengzhan, Shengfeng Tian, Jian Yu, and Houkuan Huang. "An Improved Bayesian Network Learning Algorithm Based on Dependency Analysis." In Computational Intelligence and Security. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11596448_5.
Full textLang, Yuhang. "C Language Programming System Based on Data Analysis Algorithm." In Cyber Security Intelligence and Analytics. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-31860-3_50.
Full textSharma, Manju, and Sanjay Tyagi. "An Improved Firefly Algorithm Based Cluster Analysis Technique." In Advances in Data Computing, Communication and Security. Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-8403-6_13.
Full textConference papers on the topic "To ensure the security analysis of the algorithm"
Yang, Hao, Chunhong Wang, Xueming Tang, et al. "Quantum security analysis of SM4 algorithm." In 2024 6th International Conference on Wireless Communications and Smart Grid, edited by Jinsong Wu and Pascal Lorenz. SPIE, 2024. http://dx.doi.org/10.1117/12.3049634.
Full textWadhwa, Sheela Narang, Garima Bhardwaj, and Arun Pratap Srivastava. "Analysis of Techniques to Ensure Data Security and Employee Privacy in E-HRM Systems." In 2024 1st International Conference on Sustainable Computing and Integrated Communication in Changing Landscape of AI (ICSCAI). IEEE, 2024. https://doi.org/10.1109/icscai61790.2024.10867215.
Full textRizvi, Syed, Miles Moate, Stephen Fisanick, et al. "Survey: Machine Learning Algorithm Efficacy Static Software Analysis." In 2021 International Conference on Software Security and Assurance (ICSSA). IEEE, 2021. https://doi.org/10.1109/icssa53632.2021.00017.
Full textHariharan, N. R., R. Sai Ritheshwar, R. Suseendran, R. Meena, and T. Kalaiselvi. "Genetic Algorithm Powered Bivariate Function Encryption for Robust Data Security." In 2025 4th International Conference on Sentiment Analysis and Deep Learning (ICSADL). IEEE, 2025. https://doi.org/10.1109/icsadl65848.2025.10933102.
Full textOh, Jinseob, Chanho Choi, and Dooho Choi. "Simplified Quantum Circuit Implementation for ASCON Security Analysis against Grover’s Algorithm." In 2024 Silicon Valley Cybersecurity Conference (SVCC). IEEE, 2024. http://dx.doi.org/10.1109/svcc61185.2024.10637366.
Full textSharma, Vasvi, and Siddhartha Chauhan. "Web Bot Detection Using Keyboard Behavioural Analysis." In 2nd International Conference on Emerging Applications of Artificial Intelligence, Machine Learning and Cybersecurity. AIJR Publisher, 2025. https://doi.org/10.21467/proceedings.178.10.
Full textOluwatope, Ayodeji, Bamidele Ojo, G. Adesola Aderounmu, and Matthew Adigun. "A Memory Optimized Public-Key Crypto Algorithm Using Modified Modular Exponentiation (MME)." In InSITE 2006: Informing Science + IT Education Conference. Informing Science Institute, 2006. http://dx.doi.org/10.28945/3032.
Full textRampazzo, Felipe José Aguiar, Rodrigo de Meneses, Caio Teixeira, and Marco A. Amaral Henriques. "Requirements for a Hybrid TPM Based on Optimized ML-DSA Post-Quantum Signature." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2024. http://dx.doi.org/10.5753/sbseg.2024.241843.
Full textJia, Chaolong, Weixiang Xu, and Hanning Wang. "Prediction of Track Geometry Status Based on Gray Forecast-Kalman Filter Analysis." In 2011 Joint Rail Conference. ASMEDC, 2011. http://dx.doi.org/10.1115/jrc2011-56031.
Full textJung, Martin, Axel B. Classen, and Florian Rudolph. "Post-Pandemic Impact Analysis for airport processes from security to boarding – How to respond to the next pandemic." In 10th International Conference on Human Interaction and Emerging Technologies (IHIET 2023). AHFE International, 2023. http://dx.doi.org/10.54941/ahfe1004007.
Full textReports on the topic "To ensure the security analysis of the algorithm"
Corriveau, Elizabeth, Ashley Mossell, Holly VerMeulen, Samuel Beal, and Jay Clausen. The effectiveness of laser-induced breakdown spectroscopy (LIBS) as a quantitative tool for environmental characterization. Engineer Research and Development Center (U.S.), 2021. http://dx.doi.org/10.21079/11681/40263.
Full textChurch, Joshua, LaKenya Walker, and Amy Bednar. Iterative Learning Algorithm for Records Analysis (ILARA) user manual. Engineer Research and Development Center (U.S.), 2021. http://dx.doi.org/10.21079/11681/41845.
Full textPoovendran, Radha, and Brian Matt. Security Analysis and Extensions of the PCB Algorithm for Distributed Key Generation. Defense Technical Information Center, 2005. http://dx.doi.org/10.21236/ada459087.
Full textHuang, Haohang, Jiayi Luo, Kelin Ding, Erol Tutumluer, John Hart, and Issam Qamhia. I-RIPRAP 3D Image Analysis Software: User Manual. Illinois Center for Transportation, 2023. http://dx.doi.org/10.36501/0197-9191/23-008.
Full textCarlos, Jean Clarisse. Bridging Resilience: Women at the Crossroads of Peace, Security, and Disaster Risk Management in the Philippines. Philippine Institute for Development Studies, 2025. https://doi.org/10.62986/pn2025.02.
Full textKhrushch, Nila, Pavlo Hryhoruk, Tetiana Hovorushchenko, Sergii Lysenko, Liudmyla Prystupa, and Liudmyla Vahanova. Assessment of bank's financial security levels based on a comprehensive index using information technology. [б. в.], 2020. http://dx.doi.org/10.31812/123456789/4474.
Full textKonaev, Margarita, Husanjot Chahal, Ryan Fedasiuk, Tina Huang, and Ilya Rahkovsky. U.S. Military Investments in Autonomy and AI: Executive Summary. Center for Security and Emerging Technology, 2020. http://dx.doi.org/10.51593/20200070.
Full textDudoit, Alain. The urgency of the first link: Canada’s supply chain at breaking point, a national security issue. CIRANO, 2023. http://dx.doi.org/10.54932/cxwf7311.
Full textTalbot-Wright, Hipólito, and Adrien Vogt-Schilb. Heat and High Water: Nine Pathways to Climate Resilient Development. Inter-American Development Bank, 2023. http://dx.doi.org/10.18235/0005214.
Full textVEDESHKINA, NATALIA A., and VALENTINA A. MAXIMENKO. COMPUTER GAME "THE WAY TO A SECURE INTERNET". SIB-Expertise, 2023. http://dx.doi.org/10.12731/er0743.18112023.
Full text