A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations
Many public-key cryptosystems are used in our daily lives to attain privacy, authenticity, integrity and non-repudiation. However, most of the existing public-key algorithms are based on complex mathematical computations. Until recently, building a highly secured public-key cryptosystem without util...
| Main Author: | Jaafar, Abdullah Mohammed Abdo Ali |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2011
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/41333/ http://eprints.usm.my/41333/1/ABDULLAH_MOHAMMED_ABDO.pdf |
Similar Items
Visual Public-Key Cryptosystems.
by: Samsudin, Azman
Published: (2012)
by: Samsudin, Azman
Published: (2012)
A New Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
A New Approach To Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
by: A. Alia, Mohammad Ahmad
Published: (2008)
by: A. Alia, Mohammad Ahmad
Published: (2008)
MaTRU: A new NTRU-based cryptosystem
by: Coglianese, , M, et al.
Published: (2005)
by: Coglianese, , M, et al.
Published: (2005)
Multi-Threading Elliptic Curve Cryptosystems.
by: Kanniah, Uma S., et al.
Published: (2007)
by: Kanniah, Uma S., et al.
Published: (2007)
Applicability of feed-forward and recurrent neural networks to Boolean function complexity modeling
by: BEG, A, et al.
Published: (2008)
by: BEG, A, et al.
Published: (2008)
Visualizing Phylogenetic Trees: Algorithms And Visual Comparison Techniques
by: Wan Zainon, Wan Mohd Nazmee
Published: (2011)
by: Wan Zainon, Wan Mohd Nazmee
Published: (2011)
Securing Telecommunication Based On Speaker Voice As The Public Key.
by: Enayah, Monther Rateb, et al.
Published: (2007)
by: Enayah, Monther Rateb, et al.
Published: (2007)
Zot-Binary: A New Number System And Its Application On Number Theory Based Public-Key Cryptography
by: Jahani, Shahram
Published: (2016)
by: Jahani, Shahram
Published: (2016)
Self-Verification Of Public-Key
Agreement Over Voip Using Random
Fusion Scheme
by: Alfin Syafalni, Alfin Syafalni
Published: (2016)
by: Alfin Syafalni, Alfin Syafalni
Published: (2016)
A Short Review Of Neural Network Techniques In Visual Servoing Of Robotic Manipulators.
by: Ramachandram, Dhanesh, et al.
Published: (2003)
by: Ramachandram, Dhanesh, et al.
Published: (2003)
Two Novel E-Visas Verification Schemes Based On
Public Key Infrastructure (Pki) And Identity Based
Encryption (Ibe).
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
Multipath Cluster Based Routing Protocol For Non-Uniform Node Density Mobile Ad Hoc Networks
by: Mohammed Mahdi, Mohammed Abdo
Published: (2016)
by: Mohammed Mahdi, Mohammed Abdo
Published: (2016)
CDS505 – Data Visualization & Visual Analytics
(Visualisasi Data & Analitik Visual)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
CDS505 – Data Visualization & Visual Analytics (Data Visualisasi & Analitik Visual)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
New Key Exchange Protocol Based on Mandelbrot and Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
CDS505 – Data Visualization & Visual Analytics - February 2022
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
Enhancing Control Flow Comprehension Using Zoom Visual Flow (ZViF) Technique To Represent Control Structures
by: Kadar, Rozita
Published: (2011)
by: Kadar, Rozita
Published: (2011)
Computation of cryptographic keys from face biometrics
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Document And Query Expansion Method
With Dirichlet Smoothing Model For
Retrieval Of Metadata Content In Digital
Resource Objects
by: Alma’aitah, Wafa’ Za’al Mohammad
Published: (2020)
by: Alma’aitah, Wafa’ Za’al Mohammad
Published: (2020)
Document And Query Expansion Method With Dirichlet Smoothing Model For Retrieval Of Metadata Content In Digital
Resource Objects
by: Alma’aitah, Wafa’ Za’al Mohammad
Published: (2020)
by: Alma’aitah, Wafa’ Za’al Mohammad
Published: (2020)
CMT324 – COMPUTER GRAPHICS & VISUAL COMPUTING [GRAFIK KOMPUTER & PERKOMPUTERAN VISUAL]
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2017)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2017)
CDS505 - Data Visualization & Visual Analytics (December 2019 / January 2020)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2020)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2020)
CMT324 – Computer Graphics & Visual Computing (Grafik Komputer & Perkomputeran Visual)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
Personalised cryptographic key generation based on FaceHashing
by: TEOH, A
Published: (2004)
by: TEOH, A
Published: (2004)
A novel key release scheme from biometrics
by: Song, , Ong Thian, et al.
Published: (2006)
by: Song, , Ong Thian, et al.
Published: (2006)
Off-line keyword guessing attacks on recent Public Key Encryption with Keyword Search Schemes
by: Wei-Chuen, Yau, et al.
Published: (2008)
by: Wei-Chuen, Yau, et al.
Published: (2008)
Generation of replaceable cryptographic keys from dynamic handwritten signatures
by: Yip, , WK, et al.
Published: (2006)
by: Yip, , WK, et al.
Published: (2006)
A Visual Approach For Requirement Traceability
by: Madaki, Abdulkadir Ahmad
Published: (2022)
by: Madaki, Abdulkadir Ahmad
Published: (2022)
CPC354 – Computer Graphics & Visualization (Grafik Komputer & Visualisasi) CMT324 - Computer Graphics and Visual Computing (Grafik Komputer dan Perkomputeran Visual) - February/March 2022
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
Stego Keys Performance on Feature Based Coding Method in Text Domain
by: Din, Roshidi, et al.
Published: (2017)
by: Din, Roshidi, et al.
Published: (2017)
CMT324 – COMPUTER GRAPHICS & VISUAL COMPUTING [GRAFIK KOMPUTER & PERKOMPUTERAN VISUAL] DEC. 2014 - JAN. 2015
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2015)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2015)
CMT324 – COMPUTER GRAPHICS & VISUAL COMPUTING [GRAFIK KOMPUTER & PERKOMPUTERAN VISUAL] DEC. 2015 - JAN. 2016
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2016)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2016)
Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability
by: Kuan, , YW, et al.
Published: (2005)
by: Kuan, , YW, et al.
Published: (2005)
Fast Public-Key Cryptosystems: Design And Cryptanalyses
by: Go, Bok Min
Published: (2006)
by: Go, Bok Min
Published: (2006)
POSFinger: A New Fingerprint For Passive Remote Operating System Identification.
by: Manasrah, Ahmad, et al.
Published: (2007)
by: Manasrah, Ahmad, et al.
Published: (2007)
A key distribution scheme for secure multicast over IPv6 wireless networks
by: Aye, Win, Win, et al.
Published: (2005)
by: Aye, Win, Win, et al.
Published: (2005)
Cryptanalysis of the n-party encrypted Diffie-Hellman key exchange using different passwords
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
Unreliable Network Re-Authentication Protocol Based On Hybrid Key Using CSP Approach.
by: Ramadass, Sureswaran, et al.
Published: (2007)
by: Ramadass, Sureswaran, et al.
Published: (2007)
Knowledge discovery through composited visualization, navigation and retrieval
by: Lim, Wei-Ching, et al.
Published: (2005)
by: Lim, Wei-Ching, et al.
Published: (2005)
Similar Items
-
Visual Public-Key Cryptosystems.
by: Samsudin, Azman
Published: (2012) -
A New Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007) -
A New Approach To Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
by: A. Alia, Mohammad Ahmad
Published: (2008) -
MaTRU: A new NTRU-based cryptosystem
by: Coglianese, , M, et al.
Published: (2005) -
Multi-Threading Elliptic Curve Cryptosystems.
by: Kanniah, Uma S., et al.
Published: (2007)