An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
Honey Encryption (HE) is a cryptosystem used as a reinforcement to the conventional encryption scheme to address brute-force attacks specifically in the context of password-based encryption systems. The HE scheme relies on a model called the Distribution Transforming Encoder (DTE), which focuses on...
| Main Author: | Omolara, Abiodun Esther |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2020
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/54016/ http://eprints.usm.my/54016/1/ABIODUN%20ESTHER%20OMOLARA%27S%20THESIS.pdf |
Similar Items
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
A New Image-Database Encryption Based on A Hybrid Approach of Data-at-Rest and Data-in-Motion Encryption Protocol.
by: Ooi, Bee Sien, et al.
Published: (2004)
by: Ooi, Bee Sien, et al.
Published: (2004)
Data Integrity For Cloud Computing With Homomorphic Encryption
by: Awadallah, Ruba N S
Published: (2022)
by: Awadallah, Ruba N S
Published: (2022)
k-Resilient Identity-Based Encryption in the Standard Model
by: HENG, S.-H.
Published: (2006)
by: HENG, S.-H.
Published: (2006)
Off-line keyword guessing attacks on recent Public Key Encryption with Keyword Search Schemes
by: Wei-Chuen, Yau, et al.
Published: (2008)
by: Wei-Chuen, Yau, et al.
Published: (2008)
Two Novel E-Visas Verification Schemes Based On
Public Key Infrastructure (Pki) And Identity Based
Encryption (Ibe).
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
An Approach To Enhance Image Encryption Using Block-Based Trasformation Algorithm.
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
Biometric Template Protection Using Watermarking with Hidden Password Encryption
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
Single core hardware module to implement encryption in TECB mode
by: Reaz, M. B. I., et al.
Published: (2007)
by: Reaz, M. B. I., et al.
Published: (2007)
Cryptanalysis of the n-party encrypted Diffie-Hellman key exchange using different passwords
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
Biometric Template Protection using watermarking with hidden password encryption
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
Integrating Identity-Based Encryption (Ibe) In The Return Routability Protocol (Rrp) To Enhance Signals Security
In Mobile Ipv6.
by: S. Alsayfi, Majed Salam
Published: (2010)
by: S. Alsayfi, Majed Salam
Published: (2010)
Short Text Classification Using An Enhanced Term Weighting Scheme And Filter-Wrapper Feature Selection
by: Alsmadi, Issa Mohammad Ibrahim
Published: (2018)
by: Alsmadi, Issa Mohammad Ibrahim
Published: (2018)
Double random phase encryption scheme to multiplex and simultaneous encode multiple images
by: Alfalou, A., et al.
Published: (2009)
by: Alfalou, A., et al.
Published: (2009)
Text messaging encryption system
by: Sundara Morthty, Nirmala Devi
Published: (2012)
by: Sundara Morthty, Nirmala Devi
Published: (2012)
Design And Cryptanalysis Of Encryption And Signature Schemes Without Certificates
by: Yap, Wun She
Published: (2007)
by: Yap, Wun She
Published: (2007)
Encryption using FPGA
by: Nor Robaini, Ibrahim
Published: (2008)
by: Nor Robaini, Ibrahim
Published: (2008)
Video encryption using computation between H.264/AVC and AES encryption algorithm
by: Omar zakaria, Mohamed Abomhara, et al.
Published: (2011)
by: Omar zakaria, Mohamed Abomhara, et al.
Published: (2011)
A key distribution scheme for secure multicast over IPv6 wireless networks
by: Aye, Win, Win, et al.
Published: (2005)
by: Aye, Win, Win, et al.
Published: (2005)
Multimedia encryption, transmission and authentication
Published: (2011)
Published: (2011)
Bootstrapping Kelantan and Sarawak Malay dialect models on text and phonetic analyses in text-to-speech system
by: Khaw, Jasmina Yen Min
Published: (2017)
by: Khaw, Jasmina Yen Min
Published: (2017)
Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms
by: -, Salma, et al.
Published: (2019)
by: -, Salma, et al.
Published: (2019)
Enhanced Honey Bees Colony Algorithms For Protein Tertiary Structure Prediction
by: Bahamish, Hesham Awadh Abdallah
Published: (2011)
by: Bahamish, Hesham Awadh Abdallah
Published: (2011)
Authentication scheme using unique identification method with homomorphic encryption in Mobile Cloud Computing
by: Lim, Tsu Chean, et al.
Published: (2018)
by: Lim, Tsu Chean, et al.
Published: (2018)
A new tv-based database encryption scheme using ts block cipher
by: Mohamed Sidek, Zailani, et al.
Published: (2004)
by: Mohamed Sidek, Zailani, et al.
Published: (2004)
Identifying And Classifying Unknown Words In Malay Texts.
by: Bali, Ranaivo-Malançon, et al.
Published: (2007)
by: Bali, Ranaivo-Malançon, et al.
Published: (2007)
On the security defects of an image encryption scheme
by: C., Li, et al.
Published: (2009)
by: C., Li, et al.
Published: (2009)
Video streaming and encrypting algorithms
by: Abumuala, Muhammad, et al.
Published: (2011)
by: Abumuala, Muhammad, et al.
Published: (2011)
A survey on the cryptanalysis of the advanced encryption standard
by: Z’aba, Muhammad Reza, et al.
Published: (2006)
by: Z’aba, Muhammad Reza, et al.
Published: (2006)
Image encryption algorithm based on chaotic mapping
by: Salleh, Mazleena, et al.
Published: (2003)
by: Salleh, Mazleena, et al.
Published: (2003)
Performance analysis for cloud query encryption
by: Ali Raheem, Zainalabideen, et al.
Published: (2019)
by: Ali Raheem, Zainalabideen, et al.
Published: (2019)
Hardware prototyping of an efficient encryption engine
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2010)
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2010)
Security Study and Encryption / Decryption Method
by: Al-Qdah, Majdi Taysir
Published: (2000)
by: Al-Qdah, Majdi Taysir
Published: (2000)
An efficient certificateless signature scheme
by: Yap, Wun She, et al.
Published: (2006)
by: Yap, Wun She, et al.
Published: (2006)
Rijndael encryption technique: authentication for computer application
by: Hamid Ali, Firkhan Ali, et al.
Published: (2020)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2020)
Stego Keys Performance on Feature Based Coding Method in Text Domain
by: Din, Roshidi, et al.
Published: (2017)
by: Din, Roshidi, et al.
Published: (2017)
A Pattern-Growth Sentence Compression Technique For Malay Text Summarizer
by: Alias, Suraya
Published: (2018)
by: Alias, Suraya
Published: (2018)
Feature Selection And Enhanced Krill Herd Algorithm For Text Document Clustering
by: Abualigah, Laith Mohammad Qasim
Published: (2018)
by: Abualigah, Laith Mohammad Qasim
Published: (2018)
Improved Multi-Verse Optimizer In Text Document Clustering For Topic Extraction
by: Abasi, Ammar Kamal Mousa
Published: (2021)
by: Abasi, Ammar Kamal Mousa
Published: (2021)
CDS522 – Text and Speech Analytics (Analitik Teks dan Pertuturan)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
Similar Items
-
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020) -
A New Image-Database Encryption Based on A Hybrid Approach of Data-at-Rest and Data-in-Motion Encryption Protocol.
by: Ooi, Bee Sien, et al.
Published: (2004) -
Data Integrity For Cloud Computing With Homomorphic Encryption
by: Awadallah, Ruba N S
Published: (2022) -
k-Resilient Identity-Based Encryption in the Standard Model
by: HENG, S.-H.
Published: (2006) -
Off-line keyword guessing attacks on recent Public Key Encryption with Keyword Search Schemes
by: Wei-Chuen, Yau, et al.
Published: (2008)