Academic literature on the topic 'To ensure the security analysis of the algorithm'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'To ensure the security analysis of the algorithm.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "To ensure the security analysis of the algorithm"

1

Gong, Qianru. "Application Research of Data Encryption Algorithm in Computer Security Management." Wireless Communications and Mobile Computing 2022 (July 14, 2022): 1–7. http://dx.doi.org/10.1155/2022/1463724.

Full text
Abstract:
In order to promote the research process of information security in the whole society, improve the safety factor of computer data communication, strengthen computer security management, the author proposes a computer data encryption strategy that combines the strong security of the 3DES encryption algorithm and the asymmetric encryption advantages of the RSA algorithm. Through the detailed analysis of DES encryption algorithm and 3DES encryption, creatively uses the RSA encryption algorithm to improve the single 3DES algorithm, consolidates the performance of the 3DES encryption algorithm to e
APA, Harvard, Vancouver, ISO, and other styles
2

Fasila, Kasfa Ali, and Mathew Sheena. "An efficient lightweight key exchange algorithm for internet of things applications." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 5 (2022): 5609–18. https://doi.org/10.11591/ijece.v12i5.pp5609-5618.

Full text
Abstract:
Internet of things (IoT) gained wide popularity in recent years, and this is proved by tremendous increase in use of IoT applications worldwide. Distributed IoT applications can be implemented securely with the support of blockchain. By default, blockchain will ensure authentication of involved entities as well as integrity of data. Due to storage restrictions, use of hybrid system is preferred, and this involves cloud server for storage and blockchain for other functionalities. Data kept in cloud has to be encrypted by a strong encryption algorithm. Even though core security objectives are ac
APA, Harvard, Vancouver, ISO, and other styles
3

Sevin, Abdullah, and Ünal Çavuşoğlu. "Design and Performance Analysis of a SPECK-Based Lightweight Hash Function." Electronics 13, no. 23 (2024): 4767. https://doi.org/10.3390/electronics13234767.

Full text
Abstract:
In recent years, hash algorithms have been used frequently in many areas, such as digital signature, blockchain, and IoT applications. Standard cryptographic hash functions, including traditional algorithms such as SHA-1 and MD5, are generally computationally intensive. A principal approach to improving the security and efficiency of hash algorithms is the integration of lightweight algorithms, which are designed to minimize computational overhead, into their architectural framework. This article proposes a new hash algorithm based on lightweight encryption. A new design for the lightweight ha
APA, Harvard, Vancouver, ISO, and other styles
4

Yang, Er Song, Lin You, Zhen Dong Wu, and Wang Ke Yu. "Massive Data Hybrid Encryption Algorithm Based on Cloud Computing." Applied Mechanics and Materials 651-653 (September 2014): 1864–67. http://dx.doi.org/10.4028/www.scientific.net/amm.651-653.1864.

Full text
Abstract:
In order to ensure the security of massive data and user’s privacy in cloud computing, encrypting is a preferred method to protect their security. Due to some characteristics of massive data,such as large scale and structural complexity, it makes that the traditional encryption algorithms cannot be directly used to protect the security of massive data in cloud computing. Considering the real-time and reliability of encryption algorithms, we propose a hybrid algorithm, which combines DES algorithm and one-dimensional logistic map by using the parallel computing architecture of the MapReduce. Ou
APA, Harvard, Vancouver, ISO, and other styles
5

Kasfa Ali, Fasila, and Sheena Mathew. "An efficient lightweight key exchange algorithm for internet of things applications." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 5 (2022): 5609. http://dx.doi.org/10.11591/ijece.v12i5.pp5609-5618.

Full text
Abstract:
<p><span>Internet of things (IoT) gained wide popularity in recent years, and this is proved by tremendous increase in use of IoT applications worldwide. Distributed IoT applications can be implemented securely with the support of blockchain. By default, blockchain will ensure authentication of involved entities as well as integrity of data. Due to storage restrictions, use of hybrid system is preferred, and this involves cloud server for storage and blockchain for other functionalities. Data kept in cloud has to be encrypted by a strong encryption algorithm. Even though core secur
APA, Harvard, Vancouver, ISO, and other styles
6

Muhammad, Aina’u Shehu, and Fatih Özkaynak. "SIEA: Secure Image Encryption Algorithm Based on Chaotic Systems Optimization Algorithms and PUFs." Symmetry 13, no. 5 (2021): 824. http://dx.doi.org/10.3390/sym13050824.

Full text
Abstract:
One of the general problems in modern digital society is undoubtedly the information security topic. It is critical to ensure the security of information transferred, processed, and stored throughout digital channels. Among this information, digital images draw attention in terms of frequency of use in digital channels. In this study, a new image encryption algorithm is proposed to address the security problems of digital images. The aspect that differentiates the proposed algorithm from thousands of image encryption algorithms in the literature is that it is designed within the framework of t
APA, Harvard, Vancouver, ISO, and other styles
7

Sholikhatin, Siti Alvi, Adam Prayogo Kuncoro, Afifah Lutfia Munawaroh, and Gilang Aji Setiawan. "Comparative Study of RSA Asymmetric Algorithm and AES Algorithm for Data Security." Edu Komputika Journal 9, no. 1 (2023): 60–67. http://dx.doi.org/10.15294/edukomputika.v9i1.57389.

Full text
Abstract:
There are many ways to ensure data security, one of the classic way but still effective is to use encryption. Encryption itself has two techniques or algorithms: symmetric-key (also called secret-key) and asymmetric-key encryption (also called public key). In this paper, we proposed an analysis of two algorithm of encryption: RSA and AES algorithm in term of securing digital data. The method used in this research are: RSA and AES analysis, then retrieving the result. The two algorithm is deeply and thoroughly analyzed to discover the effectiveness to secure the data. The Technological Readines
APA, Harvard, Vancouver, ISO, and other styles
8

Harfoushi, Osama, and Ruba Obiedat. "Security in Cloud Computing Using Hash Algorithm: A Neural Cloud Data Security Model." Modern Applied Science 12, no. 6 (2018): 143. http://dx.doi.org/10.5539/mas.v12n6p143.

Full text
Abstract:
Cloud computing is the delivery of computing resources over the Internet. Examples include, among others, servers, storage, big data, databases, networking, software, and analytics. Institutes that provide cloud computing services are called providers. Cloud computing services were primarily developed to help IT professionals through application development, big data storage and recovery, website hosting, on-demand software delivery, and analysis of significant data patterns that could compromise a system’s security. Given the widespread availability of cloud computing, many companies have beg
APA, Harvard, Vancouver, ISO, and other styles
9

Santoso, Zikri Akmal, Mohammad Andri Budiman, and Syahril Efendi. "A Hybrid Cryptosystem Using Rprime RSA And Extended Tiny Encryption (XTEA) For Securing Message." Data Science: Journal of Computing and Applied Informatics 9, no. 1 (2025): 18–31. https://doi.org/10.32734/jocai.v9.i1-16574.

Full text
Abstract:
Abstract. Ensuring the security of messages in sending message publicly is very important, we must ensure the security of messages with one of security method called cryptography. Focusing solely on security can affect the speed of message delivery processes. Therefore, this research is conducted to provide solutions to both of these issues. Thus, this research will discuss the Analysis of Hybrid Cryptography Scheme in the combination of RPrime RSA and XTEA (Extended Tiny Encryption) in securing instant messages. Hybrid cryptography is one of the methods in cryptography that allows to enhance
APA, Harvard, Vancouver, ISO, and other styles
10

Chen, Runyu, Lunwen Wang, Chuang Peng, and Rangang Zhu. "An Effective Sharding Consensus Algorithm for Blockchain Systems." Electronics 11, no. 16 (2022): 2597. http://dx.doi.org/10.3390/electronics11162597.

Full text
Abstract:
Sharding is the widely used approach to the trilemma of simultaneously achieving decentralization, security, and scalability in traditional blockchain systems. However, existing schemes generally involve problems such as uneven shard arithmetic power and insecure cross-shard transaction processing. In this study, we used the Practical Byzantine Fault Tolerance (PBFT) as the intra-shard consensus and, here, we propose a new sharding consensus mechanism. Firstly, we combined a jump consistent hash algorithm with signature Anchorhash to minimize the mapping of the node assignment. Then, we improv
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "To ensure the security analysis of the algorithm"

1

Nashwan, Shadi Ismail. "Performance analysis of a new dynamic authentication protocol DAKA of 3G mobile systems based on a novel Cryptography algorithm 'Anglia'." Thesis, Anglia Ruskin University, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.492950.

Full text
Abstract:
Numerous examinations of the weaknesses with Authentication of Key Agreement protocol (AKA) of Universal Mobile Telecommunications System (UMTS) have been presented by various researchers. It is plausible to suggest that the majority of the proposed solutions of authentication protocols in the reported investigative works are formulated based on asymmetric algorithms which consume more computational overhead than symmetric algorithms. There is no evidence that the symmetric algorithms could lead to the existing weaknesses.
APA, Harvard, Vancouver, ISO, and other styles
2

Chhabra, Dalbir Kaur R. "Feature selection and clustering for malicious and benign software characterization." ScholarWorks@UNO, 2014. http://scholarworks.uno.edu/td/1864.

Full text
Abstract:
Malware or malicious code is design to gather sensitive information without knowledge or permission of the users or damage files in the computer system. As the use of computer systems and Internet is increasing, the threat of malware is also growing. Moreover, the increase in data is raising difficulties to identify if the executables are malicious or benign. Hence, we have devised a method that collects features from portable executable file format using static malware analysis technique. We have also optimized the important or useful features by either normalizing or giving weightage to the
APA, Harvard, Vancouver, ISO, and other styles
3

Hitchcock, Yvonne Roslyn. "Elliptic curve cryptography for lightweight applications." Thesis, Queensland University of Technology, 2003. https://eprints.qut.edu.au/15838/1/Yvonne_Hitchcock_Thesis.pdf.

Full text
Abstract:
Elliptic curves were first proposed as a basis for public key cryptography in the mid 1980's. They provide public key cryptosystems based on the difficulty of the elliptic curve discrete logarithm problem (ECDLP) , which is so called because of its similarity to the discrete logarithm problem (DLP) over the integers modulo a large prime. One benefit of elliptic curve cryptosystems (ECCs) is that they can use a much shorter key length than other public key cryptosystems to provide an equivalent level of security. For example, 160 bit ECCs are believed to provide about the same level of security
APA, Harvard, Vancouver, ISO, and other styles
4

Hitchcock, Yvonne Roslyn. "Elliptic Curve Cryptography for Lightweight Applications." Queensland University of Technology, 2003. http://eprints.qut.edu.au/15838/.

Full text
Abstract:
Elliptic curves were first proposed as a basis for public key cryptography in the mid 1980's. They provide public key cryptosystems based on the difficulty of the elliptic curve discrete logarithm problem (ECDLP) , which is so called because of its similarity to the discrete logarithm problem (DLP) over the integers modulo a large prime. One benefit of elliptic curve cryptosystems (ECCs) is that they can use a much shorter key length than other public key cryptosystems to provide an equivalent level of security. For example, 160 bit ECCs are believed to provide about the same level of security
APA, Harvard, Vancouver, ISO, and other styles
5

Fujdiak, Radek. "Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice." Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-358408.

Full text
Abstract:
Telemetry system, Optimisation, Sensoric networks, Smart Grid, Internet of Things, Sensors, Information security, Cryptography, Cryptography algorithms, Cryptosystem, Confidentiality, Integrity, Authentication, Data freshness, Non-Repudiation.
APA, Harvard, Vancouver, ISO, and other styles
6

Lee, Chung-Cheng, and 李崇誠. "Multi-Devices Correlation Algorithm in Large Scale Security Analysis Platform." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/55123795563899309386.

Full text
Abstract:
碩士<br>國立成功大學<br>工程科學系專班<br>97<br>Current IDS is based on signature matching technique. However signature technique can not detect novel and unknown attack, if it lacks corresponding attack signatures. Many anomaly techniques based on intelligent method are then proposed to tackle with it. Unfortunately these anomaly detection algorithms are still suffered from large false positives, because the normal profiles are difficult to define. We propose three multi-devices correlation algorithms to improve the security of enterprise with a signature based IDS deployed. The first one IDS-Proxy Correla
APA, Harvard, Vancouver, ISO, and other styles
7

Tsai, Yun-Feng, and 蔡勻豐. "Security Analysis and a Fast Algorithm for the Implementation of Gollmann Cascades Pseudorandom Number Generator." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/74865432684455768754.

Full text
Abstract:
碩士<br>國立雲林科技大學<br>電子與資訊工程研究所<br>93<br>The security of Gollmann Cascades pseudorandom number generator is analyzed in this paper. Additional, an algorithm is proposed to improve the software efficiency for generating keystreams. In the security analysis, Golomb’s three randomness postulates, linear complexity, and profile of linear complexity were utilized to analyze Gollmann Cascades. The degree of randomness by changing the amount of Stage, length of LFSR, and feedback functions is discussed. To attack a pseudorandom number generator is a part of security analysis. Some methods are develo
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, Gen-Li, and 陳俊利. "The Analysis of Data Security in Wired Equivalent Privacy Algorithm for Wireless Local Area Network." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/19874938019416317909.

Full text
Abstract:
碩士<br>國立中興大學<br>電機工程學系<br>90<br>Wireless Local Area Network(WLAN) provides convenience and mobility but it also poses security challenges. The IEEE 802.11 standard defines the Wired Equivalent Privacy(WEP), which is an encapsulation of 802.11 data frames. The goal of WEP is to provide data security to the level of a wired network. But the WEP encapsulation fails to meet its design goal hacker maybe take the shared key in several hours or in few day to break the encryption because the weakness in WEP algorithms. The weakness stems from the usage of the initialization vector in WEP. This vulnera
APA, Harvard, Vancouver, ISO, and other styles
9

Shortt, Caleb James. "Hermes: A Targeted Fuzz Testing Framework." Thesis, 2015. http://hdl.handle.net/1828/5907.

Full text
Abstract:
The use of security assurance cases (security cases) to provide evidence-based assurance of security properties in software is a young field in Software Engineering. A security case uses evidence to argue that a particular claim is true. For example, the highest-level claim may be that a given system is sufficiently secure, and it would include sub claims to break that general claim down into more granular, and tangible, items - such as evidence or other claims. Random negative testing (fuzz testing) is used as evidence to support security cases and the assurance they provide. Many curr
APA, Harvard, Vancouver, ISO, and other styles
10

Nakai, Eduardo Yuzo. "Evaluation and implementation of the Ed25519 digital signature algorithm in rust." Master's thesis, 2021. http://hdl.handle.net/10198/24067.

Full text
Abstract:
Mestrado de dupla diplomação com a UTFPR - Universidade Tecnológica Federal do Paraná<br>Cryptography can be classified as secret-key and public-key cryptography. Both have distinct features and differs in performance, complexity, flexibility and security. Secret-key cryptography, considering its simplicity and performance, is commonly used for securing communications. The invention of public-key cryptography made it possible to develop more flexible cryptographic schemes and algorithms, such as key exchanges and digital signatures, hence extending the possibilities and the field of crypt
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "To ensure the security analysis of the algorithm"

1

Mironov, A., and S. Zubarev. Interaction of law enforcement agencies to ensure national security. INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1860938.

Full text
Abstract:
The monograph examines the main directions of the organization and legal regulation of the interaction of law enforcement agencies in the activities to ensure the national security of the Russian state. Special attention is paid to the important characteristics of the constituent elements of national security, theoretical and methodological aspects of the formation of the mechanism of interaction of law enforcement agencies to ensure state and public security and law and order, as well as the analysis of improving the effectiveness of the practical activities of law enforcement agencies in the
APA, Harvard, Vancouver, ISO, and other styles
2

service), SpringerLink (Online, ed. Transactions on Data Hiding and Multimedia Security VII. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Damgrd, Ivan Bjerre. Lectures on Data Security: Modern Cryptology in Theory and Practice. Springer-Verlag Berlin Heidelberg, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Steven, Furnell, Theoharidou Marianthi, and SpringerLink (Online service), eds. Information Security and Privacy Research: 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hanaoka, Goichiro. Advances in Information and Computer Security: 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Catuscia, Palamidessi, and SpringerLink (Online service), eds. Theory of Security and Applications: Joint Workshop, TOSCA 2011, Saarbrücken, Germany, March 31 - April 1, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sahai, Amit. Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings. Springer Berlin Heidelberg, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bruno, Crispo, Malcolm James, Stajano Frank, and SpringerLink (Online service), eds. Security Protocols XIX: 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers. Springer Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

United States. General Accounting Office., ed. Army force structure: Attention needed to ensure an ample supply of ready support forces : statement of Richard Davis, Director, National Security Analysis, National Security and International Affairs Division, before the Subcommittee on Military Forces and Personnel, Committee on Armed Services, House of Representatives. The Office, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

A, Huss Sorin, and SpringerLink (Online service), eds. Constructive Side-Channel Analysis and Secure Design: Third International Workshop, COSADE 2012, Darmstadt, Germany, May 3-4, 2012. Proceedings. Springer Berlin Heidelberg, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "To ensure the security analysis of the algorithm"

1

Poonia, Ramesh Chandra, Kamal Upreti, Bosco Paul Alapatt, and Samreen Jafri. "Real-Time Cyber-Physical Risk Management Leveraging Advanced Security Technologies." In Lecture Notes in Networks and Systems. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-4581-4_25.

Full text
Abstract:
AbstractConducting an in-depth study on algorithms addressing the interaction problem in the fields of machine learning and IoT security involves a meticulous evaluation of performance measures to ensure global reliability. The study examines key metrics such as accuracy, precision, recall, and F1 scores across ten scenarios. The highly competitive algorithms showcase accuracy rates ranging from 95.5 to 98.2%, demonstrating their ability to perform accurately in various situations. Precision and recall measurements yield similar information about the model's capabilities. The achieved balance between accuracy and recovery, as determined by the F1 tests ranging from 95.2 to 98.0%, emphasizes the practical importance of data transfer in the proposed method. Numerical evaluation, in addition to an analysis of overall performance metrics, provides a comprehensive understanding of the algorithm's performance and identifies potential areas for improvement. This research leads to advancements in the theoretical vision of machine learning for IoT protection. It offers real-world insights into the practical use of robust models in dynamically changing situations. As the Internet of Things environment continues to evolve, the study's results serve as crucial guides, laying the foundation for developing strong and effective security systems in the realm of interaction between virtual and material reality.
APA, Harvard, Vancouver, ISO, and other styles
2

Lachnitt, Hanna, Mathias Fleury, Leni Aniva, et al. "IsaRare: Automatic Verification of SMT Rewrites in Isabelle/HOL." In Tools and Algorithms for the Construction and Analysis of Systems. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-57246-3_17.

Full text
Abstract:
AbstractSatisfiability modulo theories (SMT) solvers are widely used to ensure the correctness of safety- and security-critical applications. Therefore, being able to trust a solver’s results is crucial. One way to increase trust is to generate independently checkable proof certificates, which record the reasoning steps done by the solver. A key challenge with this approach is that it is difficult to efficiently and accurately produce proofs for reasoning steps involving term rewriting rules. Previous work showed how a domain-specific language, Rare, can be used to capture rewriting rules for the purposes of proof production. However, in that work, the Rare rules had to be trusted, as the correctness of the rules themselves was not checked by the proof checker. In this paper, we present IsaRare, a tool that can automatically translate Rare rules into Isabelle/HOL lemmas. The soundness of the rules can then be verified by proving the lemmas. Because an incorrect rule can put the entire soundness of a proof system in jeopardy, our solution closes an important gap in the trustworthiness of SMT proof certificates. The same tool also provides a necessary component for enabling full proof reconstruction of SMT proof certificates in Isabelle/HOL. We evaluate our approach by verifying an extensive set of rewrite rules used by the cvc5 SMT solver.
APA, Harvard, Vancouver, ISO, and other styles
3

Moosavi, Sanaz Rahimi, and Arman Izadifar. "End-to-End Security Scheme for E-Health Systems Using DNA-Based ECC." In Silicon Valley Cybersecurity Conference. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96057-5_6.

Full text
Abstract:
AbstractToday, the amount of data produced and stored in computing Internet of Things (IoT) devices is growing. Massive volumes of sensitive information are exchanged between these devices making it critical to ensure the security of these data. Cryptography is a widely used method for ensuring data security. Many lightweight cryptographic algorithms have been developed to address the limitations of resources on the IoT devices. Such devices have limited processing capabilities in terms of memory, processing power, storage, etc. The primary goal of exploiting cryptographic technique is to send data from the sender to the receiver in the most secure way to prevent eavesdropping of the content of the original data. In this paper, we propose an end-to-end security scheme for IoT system. The proposed scheme consists of (i) a secure and efficient mutual authentication scheme based on the Elliptic Curve Cryptography (ECC) and the Quark lightweight hash design, and (ii) a secure end-to-end communication based on Deoxyribonucleic Acid (DNA) and ECC. DNA Cryptography is the cryptographic technique to encrypt and decrypt the original data using DNA sequences based on its biological processes. It is a novel technique to hide data from unauthorized access with the help of DNA. The security analysis of the proposed scheme reveals that it is secure against the relevant threat models and provides a higher security level than the existing related work in the literature.
APA, Harvard, Vancouver, ISO, and other styles
4

Sim, Sang Gyoo, Dong Jin Park, and Pil Joong Lee. "New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm." In Information and Communications Security. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30191-2_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pinel, Frédéric, Grégoire Danoy, and Pascal Bouvry. "Evolutionary Algorithm Parameter Tuning with Sensitivity Analysis." In Security and Intelligent Information Systems. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-25261-7_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Bentu. "Genetic Algorithm in Ginzburg-Landau Equation Analysis System." In Cyber Security Intelligence and Analytics. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-31775-0_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zheng, Yujie. "KNN Algorithm Analysis Based on Big Data Classification." In Cyber Security Intelligence and Analytics. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97874-7_148.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tian, Fengzhan, Shengfeng Tian, Jian Yu, and Houkuan Huang. "An Improved Bayesian Network Learning Algorithm Based on Dependency Analysis." In Computational Intelligence and Security. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11596448_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lang, Yuhang. "C Language Programming System Based on Data Analysis Algorithm." In Cyber Security Intelligence and Analytics. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-31860-3_50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sharma, Manju, and Sanjay Tyagi. "An Improved Firefly Algorithm Based Cluster Analysis Technique." In Advances in Data Computing, Communication and Security. Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-8403-6_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "To ensure the security analysis of the algorithm"

1

Yang, Hao, Chunhong Wang, Xueming Tang, et al. "Quantum security analysis of SM4 algorithm." In 2024 6th International Conference on Wireless Communications and Smart Grid, edited by Jinsong Wu and Pascal Lorenz. SPIE, 2024. http://dx.doi.org/10.1117/12.3049634.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wadhwa, Sheela Narang, Garima Bhardwaj, and Arun Pratap Srivastava. "Analysis of Techniques to Ensure Data Security and Employee Privacy in E-HRM Systems." In 2024 1st International Conference on Sustainable Computing and Integrated Communication in Changing Landscape of AI (ICSCAI). IEEE, 2024. https://doi.org/10.1109/icscai61790.2024.10867215.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rizvi, Syed, Miles Moate, Stephen Fisanick, et al. "Survey: Machine Learning Algorithm Efficacy Static Software Analysis." In 2021 International Conference on Software Security and Assurance (ICSSA). IEEE, 2021. https://doi.org/10.1109/icssa53632.2021.00017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hariharan, N. R., R. Sai Ritheshwar, R. Suseendran, R. Meena, and T. Kalaiselvi. "Genetic Algorithm Powered Bivariate Function Encryption for Robust Data Security." In 2025 4th International Conference on Sentiment Analysis and Deep Learning (ICSADL). IEEE, 2025. https://doi.org/10.1109/icsadl65848.2025.10933102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Oh, Jinseob, Chanho Choi, and Dooho Choi. "Simplified Quantum Circuit Implementation for ASCON Security Analysis against Grover’s Algorithm." In 2024 Silicon Valley Cybersecurity Conference (SVCC). IEEE, 2024. http://dx.doi.org/10.1109/svcc61185.2024.10637366.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sharma, Vasvi, and Siddhartha Chauhan. "Web Bot Detection Using Keyboard Behavioural Analysis." In 2nd International Conference on Emerging Applications of Artificial Intelligence, Machine Learning and Cybersecurity. AIJR Publisher, 2025. https://doi.org/10.21467/proceedings.178.10.

Full text
Abstract:
Ever increasing technology and internet availability resulted in a huge rise in web bots. Users utilize web bots with good or malicious intent. The increase in web bot traffic has raised concerns for the safety and security of the web. To address this issue, there was a rise in the development and implementation of bot detection mechanisms. To ensure the safety and security of the web, various methodologies have been applied, including algorithms based on temporal and behavioral characteristics, CAPTCHAs, etc. With advancements in bots mimicking human fingerprints, mouse movements, and feeding
APA, Harvard, Vancouver, ISO, and other styles
7

Oluwatope, Ayodeji, Bamidele Ojo, G. Adesola Aderounmu, and Matthew Adigun. "A Memory Optimized Public-Key Crypto Algorithm Using Modified Modular Exponentiation (MME)." In InSITE 2006: Informing Science + IT Education Conference. Informing Science Institute, 2006. http://dx.doi.org/10.28945/3032.

Full text
Abstract:
Since the advent of data communication over networks, it has become imperative to ensure security of information. Cryptography is a technique that is being employed. This paper takes a look at an important aspect of the public key encryption scheme, the modular exponentiation technique, with the view of optimizing it. Taking a look at some public key encryption schemes, it would be observed that the modular exponentiation process is primal to achieving high speed algorithms in data encryption. With special emphasis on the Montgomery exponentiation algorithm, a blend of this algorithm with the
APA, Harvard, Vancouver, ISO, and other styles
8

Rampazzo, Felipe José Aguiar, Rodrigo de Meneses, Caio Teixeira, and Marco A. Amaral Henriques. "Requirements for a Hybrid TPM Based on Optimized ML-DSA Post-Quantum Signature." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2024. http://dx.doi.org/10.5753/sbseg.2024.241843.

Full text
Abstract:
A Trusted Platform Module (TPM) is used to ensure trust between connected devices by storing device integrity measurements. Both TPM and traditional security systems rely on asymmetric cryptography, which can be vulnerable to quantum computers. This work aims to find the requirements for a TPM secured by traditional and post-quantum algorithms, considering the transition through a hybrid model that remains secure even if the post-quantum algorithm breaks. Then, it analyzes the impact of this hybrid model in a TPM using a hybrid TPM emulated in software.
APA, Harvard, Vancouver, ISO, and other styles
9

Jia, Chaolong, Weixiang Xu, and Hanning Wang. "Prediction of Track Geometry Status Based on Gray Forecast-Kalman Filter Analysis." In 2011 Joint Rail Conference. ASMEDC, 2011. http://dx.doi.org/10.1115/jrc2011-56031.

Full text
Abstract:
Excellent condition of track geometry status is the foundation to ensure train travel security. The detection data of track inspection car contains many valuable features of the track status. The technique of gray forecast and Kalman filtering can be used to investigate the problem and predict the status change of the track geometry. In this paper, gray forecast is used in qualitative analysis of track geometry status changes, and we predict the development of track geometry status change using the Kalman filter prediction model and specific recursive algorithm, established prediction model of
APA, Harvard, Vancouver, ISO, and other styles
10

Jung, Martin, Axel B. Classen, and Florian Rudolph. "Post-Pandemic Impact Analysis for airport processes from security to boarding – How to respond to the next pandemic." In 10th International Conference on Human Interaction and Emerging Technologies (IHIET 2023). AHFE International, 2023. http://dx.doi.org/10.54941/ahfe1004007.

Full text
Abstract:
The COVID-19 pandemic globally affected the complete transport sector and especially passenger air transport with nosediving traffic numbers, wide-ranging travel restrictions and long-lasting uncertainties (see IATA, 2020). As air travel starts to recover cautiously from severe losses of traffic volumes over the pre-pandemic year 2019 and travel restrictions are relaxing, air transport providers have to ensure that passengers as well as people working within the air transport sector will remain safe and be prepared for the next Pandemic. For Example, arboviruses have the potential to spark the
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "To ensure the security analysis of the algorithm"

1

Corriveau, Elizabeth, Ashley Mossell, Holly VerMeulen, Samuel Beal, and Jay Clausen. The effectiveness of laser-induced breakdown spectroscopy (LIBS) as a quantitative tool for environmental characterization. Engineer Research and Development Center (U.S.), 2021. http://dx.doi.org/10.21079/11681/40263.

Full text
Abstract:
Laser-induced breakdown spectroscopy (LIBS) is a rapid, low-cost analytical method with potential applications for quantitative analysis of soils for heavy metal contaminants found in military ranges. The Department of Defense (DoD), Army, and Department of Homeland Security (DHS) have mission requirements to acquire the ability to detect and identify chemicals of concern in the field. The quantitative potential of a commercial off-the-shelf (COTS) hand-held LIBS device and a classic laboratory bench-top LIBS system was examined by measuring heavy metals (antimony, tungsten, iron, lead, and zi
APA, Harvard, Vancouver, ISO, and other styles
2

Church, Joshua, LaKenya Walker, and Amy Bednar. Iterative Learning Algorithm for Records Analysis (ILARA) user manual. Engineer Research and Development Center (U.S.), 2021. http://dx.doi.org/10.21079/11681/41845.

Full text
Abstract:
This manual is intended for new users with minimal or no experience with using the Iterative Learning Algorithm for Records Analysis (ILARA) tool. The goal of this document is to give an overview of the main functions of ILARA. The primary focus of this document is to demonstrate functionality. Every effort has been made to ensure this document is an accurate representation of the functionality of the ILARA tool. For additional information about this manual, contact ERDC.JAIC@erdc.dren.mil.
APA, Harvard, Vancouver, ISO, and other styles
3

Poovendran, Radha, and Brian Matt. Security Analysis and Extensions of the PCB Algorithm for Distributed Key Generation. Defense Technical Information Center, 2005. http://dx.doi.org/10.21236/ada459087.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Huang, Haohang, Jiayi Luo, Kelin Ding, Erol Tutumluer, John Hart, and Issam Qamhia. I-RIPRAP 3D Image Analysis Software: User Manual. Illinois Center for Transportation, 2023. http://dx.doi.org/10.36501/0197-9191/23-008.

Full text
Abstract:
Riprap rock and aggregates are commonly used in various engineering applications such as structural, transportation, geotechnical, and hydraulic engineering. To ensure the quality of the aggregate materials selected for these applications, it is important to determine their morphological properties such as size and shape. There have been many imaging approaches developed to characterize the size and shape of individual aggregates, but obtaining 3D characterization of aggregates in stockpiles at production or construction sites can be a challenging task. This research study introduces a new app
APA, Harvard, Vancouver, ISO, and other styles
5

Carlos, Jean Clarisse. Bridging Resilience: Women at the Crossroads of Peace, Security, and Disaster Risk Management in the Philippines. Philippine Institute for Development Studies, 2025. https://doi.org/10.62986/pn2025.02.

Full text
Abstract:
Women face compounded vulnerabilities at the intersection of gender issues, conflict, and natural disasters, further exacerbated by socioeconomic inequalities. This Policy Note emphasizes the need to align the National Action Plan on Women, Peace, and Security (NAPWPS) 2023–2033 with the National Disaster Risk Reduction and Management Plan (NDRRMP) 2020–2030 to integrate gender perspectives and enhance women's leadership in these areas. Furthermore, it recommends developing strategic communication plans to promote women's roles in peacebuilding and disaster management, enhancing data collectio
APA, Harvard, Vancouver, ISO, and other styles
6

Khrushch, Nila, Pavlo Hryhoruk, Tetiana Hovorushchenko, Sergii Lysenko, Liudmyla Prystupa, and Liudmyla Vahanova. Assessment of bank's financial security levels based on a comprehensive index using information technology. [б. в.], 2020. http://dx.doi.org/10.31812/123456789/4474.

Full text
Abstract:
The article considers the issues of assessing the level of financial security of the bank. An analysis of existing approaches to solving this problem. A scientific and methodological approach based on the application of comprehensive assessment technology is proposed. The computational algorithm is presented in the form of a four-stage procedure, which contains the identification of the initial data set, their normalization, calculation of the partial composite indexes, and a comprehensive index of financial security. Results have interpretation. Determining the levels of financial security an
APA, Harvard, Vancouver, ISO, and other styles
7

Konaev, Margarita, Husanjot Chahal, Ryan Fedasiuk, Tina Huang, and Ilya Rahkovsky. U.S. Military Investments in Autonomy and AI: Executive Summary. Center for Security and Emerging Technology, 2020. http://dx.doi.org/10.51593/20200070.

Full text
Abstract:
Today’s research and development investments will set the course for artificial intelligence in national security in the coming years. This Executive Summary presents key findings and recommendations from CSET’s two-part analysis of U.S. military investments in autonomy and AI, including our assessment of DOD’s research priorities, trends and gaps, as well as ways to ensure U.S. military leadership in AI in the short and the long term.
APA, Harvard, Vancouver, ISO, and other styles
8

Dudoit, Alain. The urgency of the first link: Canada’s supply chain at breaking point, a national security issue. CIRANO, 2023. http://dx.doi.org/10.54932/cxwf7311.

Full text
Abstract:
The creation of an intelligent supply chain is now an urgent national security priority that cannot be achieved without the joint mobilization of various stakeholders in Canada. It is not, however, an end in itself: the achievement of a single, competitive, sustainable, and consumer-focused domestic market should be the ultimate outcome of the national taskforce needed to collaboratively implement the recommendations of three complementary public policy reports published in 2022 on the state of the supply chain in Canada. The supply chain challenge is vast, and it will only become more complex
APA, Harvard, Vancouver, ISO, and other styles
9

Talbot-Wright, Hipólito, and Adrien Vogt-Schilb. Heat and High Water: Nine Pathways to Climate Resilient Development. Inter-American Development Bank, 2023. http://dx.doi.org/10.18235/0005214.

Full text
Abstract:
Climate change has arrived, putting lives, ecosystems, and economies in jeopardy. "Heat and High Water" provides a much-needed primer on how countries can adapt to this harsh new reality. Written for a general audience in clear, non-technical language, the book examines climate threats and resilience strategies sector by sector, focusing on the specific challenges for Latin America and the Caribbean. How can dense population centers use wetlands and parks, as well as other elements of urban planning, to protect against floods and landslides? What can be done to ensure the health and wellbeing
APA, Harvard, Vancouver, ISO, and other styles
10

VEDESHKINA, NATALIA A., and VALENTINA A. MAXIMENKO. COMPUTER GAME "THE WAY TO A SECURE INTERNET". SIB-Expertise, 2023. http://dx.doi.org/10.12731/er0743.18112023.

Full text
Abstract:
The computer game "The Way to a secure Internet" was created by teachers of the MDOU "D/ s № 73" of Magnitogorsk on the cross-platform environment for the development of Unity computer programs. The game is aimed at older preschool children. It is aimed at the formation of life skills of students in the information society in order to ensure the information security of children. The main educational material is the selection of rules for safe behavior when using the Internet information network by students, taking into account the peculiarities of children's perception of information. The plot
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!