Analysable Chaos-based Design Paradigms For Cryptographic Applications
Chaos-based cryptography has garnered significant attention, with many designs focusing on obscuring security through complex designs that make them difficult to analyze, improper design structures (ad-hoc designs) with inaccurate keyspace justification. These compromise the standards of well design...
| Main Author: | Abba, Abubakar |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2024
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/62227/ |
| Abstract | Abstract here |
Similar Items
Enhancing Svd-Based Image
Watermarking Strategies Based On
Digital Chaos
by: Alshoura, Wafa’hamdan Suleiman
Published: (2022)
by: Alshoura, Wafa’hamdan Suleiman
Published: (2022)
Improving Chaotic Cryptographic
Primitives Based On Map’s
Complexity And Period Length Of
The Chaotic Maps
by: Masoumi, Amir Akhavan
Published: (2015)
by: Masoumi, Amir Akhavan
Published: (2015)
Bootstrapping Kelantan and Sarawak Malay dialect models on text and phonetic analyses in text-to-speech system
by: Khaw, Jasmina Yen Min
Published: (2017)
by: Khaw, Jasmina Yen Min
Published: (2017)
A Systematic Design Method For Modeling
Complex Processes And Interactions
In Web Hypermedia Applications
by: Jantan, Azrul Hazri
Published: (2009)
by: Jantan, Azrul Hazri
Published: (2009)
Action-Based Help Technique To Improve Learnability And Understandability Of Web Applications
by: Shamsuddin, Nurul Afiqah
Published: (2014)
by: Shamsuddin, Nurul Afiqah
Published: (2014)
Xcast Based Routing Protocol For Push To Talk Application In Mobile Ad Hoc Networks
by: Alzyoud, Faisal Yousef Abed-alrahman
Published: (2011)
by: Alzyoud, Faisal Yousef Abed-alrahman
Published: (2011)
Xcast Based Routing Protocol For Push To Talk Application In Mobile Ad Hoc Networks
by: Al-Zyoud, Faisal Yousef Abed-alrahman
Published: (2011)
by: Al-Zyoud, Faisal Yousef Abed-alrahman
Published: (2011)
Zot-Binary: A New Number System And Its Application On Number Theory Based Public-Key Cryptography
by: Jahani, Shahram
Published: (2016)
by: Jahani, Shahram
Published: (2016)
Vehicle To Vehicle Physical Sidelink Shared Channel Capacity Estimation And Resource Allocation For 5g Network
by: Abubakar, Saadatu
Published: (2024)
by: Abubakar, Saadatu
Published: (2024)
Design Of Perturbative Hyper-Heuristics For Combinatorial Optimisation
by: Choong, Shin Siang
Published: (2019)
by: Choong, Shin Siang
Published: (2019)
Modified And Ensemble Intelligent
Water Drop Algorithms And Their
Applications
by: O. F. Alijla, Basem
Published: (2015)
by: O. F. Alijla, Basem
Published: (2015)
Enhanced Bio-Inspired Algorithm With Pedestrian Simulation
For Spatial Layout Design
by: Ibrahim, Najihah
Published: (2023)
by: Ibrahim, Najihah
Published: (2023)
New Representation Method For Integers And Its Application On Elliptic Curve Cryptography
by: Eghdamian, Arash
Published: (2020)
by: Eghdamian, Arash
Published: (2020)
Multi-View Retrieval Of Software Design Specifications Using Similarity Assessment Approach
by: Adamu, Alhassan
Published: (2017)
by: Adamu, Alhassan
Published: (2017)
Internet Telephony Transport Protocol (ITTP): An Efficient Transport Protocol For Voip Applications
by: Abu-Alhaj, Mosleh Mohammad
Published: (2011)
by: Abu-Alhaj, Mosleh Mohammad
Published: (2011)
Chaotification Methods For
Enhancing One-Dimension Digital
Chaotic Maps For Applications In
Cryptography
by: Alawida, Moatsum Khalif Oduh
Published: (2020)
by: Alawida, Moatsum Khalif Oduh
Published: (2020)
Chaotification Methods For
Enhancing One-Dimension Digital
Chaotic Maps For Applications In
Cryptography
by: Alawida, Moatsum Khalif Oduh
Published: (2022)
by: Alawida, Moatsum Khalif Oduh
Published: (2022)
Software Model Checking For Distributed Applications Using Hybridization Of Centralization And Cache Approaches
by: Hing, Ratana
Published: (2024)
by: Hing, Ratana
Published: (2024)
Optimal Design Of Femoral Hip Prosthesis Using Topology
Optimisation To Reduce Stress Shielding
by: Ridzwan, Mohamad Ikhwan Zaini
Published: (2005)
by: Ridzwan, Mohamad Ikhwan Zaini
Published: (2005)
Rule-Based Approach For Detecting Botnet Based On Domain Name System
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
Prediction Of User Behavior Intention Towards Robo-Advisor Applications In Fintech Using The Utaut Model
by: Cheong, Suk Fun
Published: (2023)
by: Cheong, Suk Fun
Published: (2023)
Analogical Learner For Natural Language Processing Based On Structured String-tree Correspondence (sstc) And
Case-based Reasoning
by: Lim, Huan Ngee
Published: (2009)
by: Lim, Huan Ngee
Published: (2009)
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
by: Keshkeh, Kinan
Published: (2022)
by: Keshkeh, Kinan
Published: (2022)
Two Novel E-Visas Verification Schemes Based On
Public Key Infrastructure (Pki) And Identity Based
Encryption (Ibe).
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
Harmony Search-Based Hyper-Heuristic For Scheduling Problems
by: Anwar, Khairul
Published: (2018)
by: Anwar, Khairul
Published: (2018)
Division-Based Methods For Large Point Sets Registration
by: Chen , Junfen
Published: (2016)
by: Chen , Junfen
Published: (2016)
A behavior based algorithm to detect spam bots
by: Zamil, Mohammed Fadhil
Published: (2009)
by: Zamil, Mohammed Fadhil
Published: (2009)
Harmony search-based fuzzy clustering algorithms for image segmentation.
by: Alia, Osama Moh’d Radi
Published: (2011)
by: Alia, Osama Moh’d Radi
Published: (2011)
A Framework For Dynamic Updating In Component-based
Software Systems
by: Mohammed Alhazbi , Saleh
Published: (2009)
by: Mohammed Alhazbi , Saleh
Published: (2009)
A Human Community-Based Genetic
Algorithm Model
(HCBGA)
by: Al-Madi, Nagham Azmi Qasim
Published: (2009)
by: Al-Madi, Nagham Azmi Qasim
Published: (2009)
A Fusion-Based Framework For Explainable Suicide Attempt Prediction
by: Nordin, Noratikah
Published: (2024)
by: Nordin, Noratikah
Published: (2024)
An Ontology And Constraint-based Approach For Dynamic Personalised Planning In Healthcare
by: Mahiddin , Normadiah
Published: (2009)
by: Mahiddin , Normadiah
Published: (2009)
Indexing Of Bilingual Knowledge Bank
Based On The Synchronous Sstc Structure
by: Ye , Hong Hoe
Published: (2006)
by: Ye , Hong Hoe
Published: (2006)
Rule Generation Based On Structural Clustering For Automatic Question Answering
by: Song , Shen
Published: (2009)
by: Song , Shen
Published: (2009)
Similarity Segmentation Approach For Sensor-Based Human Activity Recognition
by: Baraka, Abdulrahman M. A.
Published: (2024)
by: Baraka, Abdulrahman M. A.
Published: (2024)
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018)
by: Elejla, Omar E. O.
Published: (2018)
Ontology-Based Source Code Retrieval Model To Support Program Comprehension
by: Kadar, Rozita
Published: (2019)
by: Kadar, Rozita
Published: (2019)
An Approach To Enhance Image Encryption Using Block-Based Trasformation Algorithm.
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
Feature Selection Method Based On Hybrid Filter-Metaheuristic Wrapper Approach
by: Jothi, Neesha
Published: (2020)
by: Jothi, Neesha
Published: (2020)
Metaheuristic-Based Neural Network
Training And Feature Selector For
Intrusion Detection
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
Similar Items
-
Enhancing Svd-Based Image
Watermarking Strategies Based On
Digital Chaos
by: Alshoura, Wafa’hamdan Suleiman
Published: (2022) -
Improving Chaotic Cryptographic
Primitives Based On Map’s
Complexity And Period Length Of
The Chaotic Maps
by: Masoumi, Amir Akhavan
Published: (2015) -
Bootstrapping Kelantan and Sarawak Malay dialect models on text and phonetic analyses in text-to-speech system
by: Khaw, Jasmina Yen Min
Published: (2017) -
A Systematic Design Method For Modeling
Complex Processes And Interactions
In Web Hypermedia Applications
by: Jantan, Azrul Hazri
Published: (2009) -
Action-Based Help Technique To Improve Learnability And Understandability Of Web Applications
by: Shamsuddin, Nurul Afiqah
Published: (2014)
