A Review on Biological Inspired Computation in Cryptology
Cryptology is a field that concerned with cryptography and cryptanalysis. Cryptography, which is a key technology in providing a secure transmission of information, is a study of designing strong cryptographic algorithms, while cryptanalysis is a study of breaking the cipher. Recently biological app...
| Main Authors: | Ibrahim, Subariah, Maarof, Mohd Aizaini |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Penerbit UTM Press
2005
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/3248/ http://eprints.utm.my/3248/1/JIT_15Jun2005.pdf |
Similar Items
Cryptanalysis using biological inspired computing approaches
by: Ahmad, Badrisham, et al.
Published: (2006)
by: Ahmad, Badrisham, et al.
Published: (2006)
Diffusion analysis af a scalable fiestel network
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Modified key size determination models for symmetric ciphers
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Diffusion analysis of EFN-MDS structure
by: Ibrahim, Subariah, et al.
Published: (2006)
by: Ibrahim, Subariah, et al.
Published: (2006)
Symmetric Key Size for Different Level of Information Classification
by: Ibrahim, Subariah, et al.
Published: (2006)
by: Ibrahim, Subariah, et al.
Published: (2006)
Avalanche Analysis of Extended Feistel Network
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
A BIOLOGICALLY INSPIRED OBJECT RECOGNITION SYSTEM
by: Hamada , R. H. Al-Absi, et al.
Published: (2010)
by: Hamada , R. H. Al-Absi, et al.
Published: (2010)
Biologically Inspired Object Recognition System
by: Hamada , R. H. Al-Absi, et al.
Published: (2010)
by: Hamada , R. H. Al-Absi, et al.
Published: (2010)
A Proposed Biologically Inspired Model for Object Recognition
by: Hamada , R. H. Al-Absi, et al.
Published: (2009)
by: Hamada , R. H. Al-Absi, et al.
Published: (2009)
BIOLOGICALLY INSPIRED PROTOCOL FOR SECURING A CLASS OF NETWORKS
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
A Proposed Model of Biologically-Inspired Sound Signal Analyzer
by: Hammuzamer , Irwan, et al.
Published: (2009)
by: Hammuzamer , Irwan, et al.
Published: (2009)
A Proposed Biologically-Inspired Model to Analyze Signal Sound
by: Hammuzamer Irwan , Hamzah, et al.
Published: (2009)
by: Hammuzamer Irwan , Hamzah, et al.
Published: (2009)
Biologically-Inspired Modeling of Filtering Noise in Signal Sound
by: Hammuzamer , Irwan, et al.
Published: (2009)
by: Hammuzamer , Irwan, et al.
Published: (2009)
Biologically-Inspired Abstraction Model to Analyze Sound Signal
by: Hammuzamer Irwan , Hamzah, et al.
Published: (2008)
by: Hammuzamer Irwan , Hamzah, et al.
Published: (2008)
Cryptanalysis in cryptographic algorithm design
by: Z'aba, Muhammad Reza, et al.
Published: (2006)
by: Z'aba, Muhammad Reza, et al.
Published: (2006)
A New Abstraction Model for Biologically- Inspired Sound Signal Analyzer
by: Hammuzamer Irwan , Hamzah, et al.
Published: (2009)
by: Hammuzamer Irwan , Hamzah, et al.
Published: (2009)
Biologically Inspired Model for Securing Mobile Ad Hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Biological Inspired Approach in Parallel Immunology System for Network
Security
by: muna, elsadig, et al.
Published: (2010)
by: muna, elsadig, et al.
Published: (2010)
A Proposed Application Model for a Biologically-Inspired Sound Signal Analyzer
by: Hammuzamer, Irwan, et al.
Published: (2009)
by: Hammuzamer, Irwan, et al.
Published: (2009)
A Proposed Application Model for a Biologically-Inspired Sound Signal Analyzer
by: Hammuzamer Irwan, Hamzah, et al.
Published: (2009)
by: Hammuzamer Irwan, Hamzah, et al.
Published: (2009)
Biologically Inspired Execution Framework for
Vulnerable Workflow Systems
by: Safdar, S., et al.
Published: (2009)
by: Safdar, S., et al.
Published: (2009)
Biologically inspired architecture for securing hybrid mobile ad hoc networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Biologically Inspired Model for Securing Hybrid Mobile Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
Biologically Inspired Signal Noise Elimination Using Human Ear Model with Concurrent Algorithm
by: Hammuzamer Irwan, Hamzah, et al.
Published: (2008)
by: Hammuzamer Irwan, Hamzah, et al.
Published: (2008)
Biologically-Inspired (Botany) Mobile Agent Based Self-Healing Wireless Sensor Network
by: Vasaki , Ponnusamy, et al.
Published: (2010)
by: Vasaki , Ponnusamy, et al.
Published: (2010)
Layered biologically inspired self-healing software system architecture
by: Azween, Abdullah, et al.
Published: (2008)
by: Azween, Abdullah, et al.
Published: (2008)
Clonal selection algorithm for the cryptanalysis of a simple substitution cipher
by: Ahmad, Badrisham, et al.
Published: (2006)
by: Ahmad, Badrisham, et al.
Published: (2006)
Biological Inspired Intrusion Prevention and Self-healing System for Network Security Based on Danger Theory
by: Muna, Elsadig, et al.
Published: (2009)
by: Muna, Elsadig, et al.
Published: (2009)
Secret sharing scheme for collaborative access system
by: Kadir, Rashidah, et al.
Published: (2000)
by: Kadir, Rashidah, et al.
Published: (2000)
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
Diffusion analysis of EFN-MDS structure
by: Ibrahim, Subariah
Published: (2006)
by: Ibrahim, Subariah
Published: (2006)
A survey on the cryptanalysis of the advanced encryption standard
by: Z’aba, Muhammad Reza, et al.
Published: (2006)
by: Z’aba, Muhammad Reza, et al.
Published: (2006)
Immunology Inspired Framework for Securing MANETs
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Immune Inspired Framework for MANETs’ Security
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
ERNN: A biologically inspired feedforward neural network to discriminate emotion from EEG signal
by: Khosrowabadi, Reza, et al.
Published: (2014)
by: Khosrowabadi, Reza, et al.
Published: (2014)
Bio-inspired for Features Optimization and Malware Detection
by: Mohd Faizal, Ab Razak, et al.
Published: (2018)
by: Mohd Faizal, Ab Razak, et al.
Published: (2018)
Security awareness: A lesson from Tcpdump and Ethereal
by: Rohani, Mohd. Fo’ad, et al.
Published: (2005)
by: Rohani, Mohd. Fo’ad, et al.
Published: (2005)
Immune-Inspired Framework for securing Hybrid MANET
by: Yasir Abdelgadir , Mohamed, et al.
by: Yasir Abdelgadir , Mohamed, et al.
The optimization of stepping stone detection : packet capturing steps
by: Omar, Mohd. Nizam, et al.
Published: (2006)
by: Omar, Mohd. Nizam, et al.
Published: (2006)
The optimization of stepping stone detection: Packet capturing steps
by: Omar, Mohd Nizam, et al.
Published: (2006)
by: Omar, Mohd Nizam, et al.
Published: (2006)
Similar Items
-
Cryptanalysis using biological inspired computing approaches
by: Ahmad, Badrisham, et al.
Published: (2006) -
Diffusion analysis af a scalable fiestel network
by: Ibrahim, Subariah, et al.
Published: (2005) -
Modified key size determination models for symmetric ciphers
by: Ibrahim, Subariah, et al.
Published: (2005) -
Diffusion analysis of EFN-MDS structure
by: Ibrahim, Subariah, et al.
Published: (2006) -
Symmetric Key Size for Different Level of Information Classification
by: Ibrahim, Subariah, et al.
Published: (2006)