Showing 1 - 18 results of 18 for search '"encryption algorithms"', query time: 0.06s Refine Results
  1. 1

    A Review of Artificial Intelligence (AI) Applications in Key Generation for Encryption Algorithms by Zahraa Atheer Ali, Hasan Falah Hasan

    Published 2025-03-01
    Subjects: “…AI Applications, key generation, encryption algorithms, string, image…”
    Get full text
    Article
  2. 2

    Predicting Diabetes Mellitus with Machine Learning Techniques by Heba Ahmed Jassim, Omar R. Kadhim, Zahraa Khduair Taha, Johnny Koh Siaw Paw, Yaw Chong Tak, Tiong Sieh Kiong

    Published 2025-06-01
    Subjects: “…AES, RSA, ECC, ChaCha20, Hybrid Algorithms and Encryption Algorithms.…”
    Get full text
    Article
  3. 3
  4. 4

    Application of Algorithms on Lattices in Post-Quantum Cryptography by Nikolai Urban, Elena Melnikova

    Published 2024-03-01
    Subjects: “…post-quantum encryption algorithms…”
    Get full text
    Article
  5. 5

    Applying Quran Security and Hamming CodesFor Preventing of Text Modification by Baghdad Science Journal

    Published 2011-06-01
    Subjects: “…Security systems, Hamming Codes, Error detection and correction, Encryption algorithms, public key encryption, RSA Encryption Algorithm…”
    Get full text
    Article
  6. 6
  7. 7
  8. 8

    Control research and application of conventional operations without real-time networks by Zhengfeng ZHANG

    Published 2020-01-01
    Subjects: “…remote non-network;encryption algorithm;convention;agreed time…”
    Get full text
    Article
  9. 9

    Integral Imaging Based Optical Image Encryption Using CA-DNA Algorithm by Ying Wang, Xiao-Wei Li, Qiong-Hua Wang

    Published 2021-01-01
    Subjects: “…Optical encryption algorithm…”
    Get full text
    Article
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Wireless sensor security communication and anti-leak locating technology based on region partition in power mobile inspection by Min XU, Lin PENG, Haiyun HAN, Nige LI, Zhansheng HOU

    Published 2016-02-01
    Subjects: “…private key and timestamp cross certification;high strength encryption algorithm suite;leak proof private key…”
    Get full text
    Article
  17. 17
  18. 18