DSpace Repository

Browsing by Subject "Cryptography"

Browsing by Subject "Cryptography"

Sort by: Order: Results:

  • Khan, Md. Abbas Ali; Ali, Mohammad Hanif; Haque, A. K. M. Fazlul; Debnath, Chandan; Jabiullah, Md. Ismail; Rahman, Md. Riazur (Scopus, 2021)
    In the twenty-first century, a human being is passing through the world with generosity of technology and most of it’s the systems are being operated by automated or remote access control. However, sensor technology is ...
  • Sarkar, Md.Muhib; Eti, Samira Ishrat; Khatun, Nurmahal (Daffodil International University, 2022-01-05)
    Securing data encryption and decryption using Cryptography and ways. Due to recent developments in crypto analysis, furnishing security to particular contents, dispatches, or digital images using cryptography has come ...
  • Ferdows, Jannatul; Mehedi, SK. Tanzir; Hossain, A.S.M. Delowar; Shamim, Abdullah Al Mamun; Rasiq, G.M. Rasiqul Islam (A Comprehensive Study of IoT Application Layer Security Management, IEEE, 2021-01-01)
    IoT is a revolution of a new era. In all of this applications data transfer from machine to machine, machine to human. Between this transection of data should ensure security. This technology makes human life easy but ...
  • Alamin-Ul –Islam, Md.; Rabiul Islam, Md.; Sany, Md Jahidul Islam (Daffodil International University, 2019-12-10)
    In neoteric time, network and data security has become most relevant concern because of the volume of exchange hypersensitive data over internet flourishing day by day. Many approaches are obtainable in the field of data ...
  • Islam, Md. Ashiqul; Kobita, Aysha Akter; Hossen, Md. Sagar; Rumi, Laila Sultana; Karim, Rafat; Tabassum, Tasfia (Evolutionary Computing and Mobile Sustainable Networks. Lecture Notes on Data Engineering and Communications Technologies, Springer, 2020-08-01)
    Recently, a strong security system is very important for a safe banking system. To prevent hacking of important information of bank and client, a secure banking system is a must. This paper deals with a strong security ...
  • Islam, Md. Ashiqul; Kobita, Aysha Akter; Hossen, Md. Sagar; Rumi, Laila Sultana; Karim, Rafat; Tabassum, Tasfia (Springer, 2021)
    Recently, a strong security system is very important for a safe banking system. To prevent hacking of important information of bank and client, a secure banking system is a must. This paper deals with a strong security ...
  • Islam, Md. Ashiqul; Tabassum, Tasfia; Hossen, Md. Sagar; Hossain, Shahed; Hossain, Mosharof; Jony, Anik Hassan (IEEE, 2020-11)
    presently a day’s data dissemination over the world become progressively simpler because of quick web and advancement of various kind of technology, for this explanation individuals become increasingly stressed about their ...
  • Karim, Rafat; Rumi, Laila Sultana; Islam, Md. Ashiqul; Kobita, Aysha Akter; Tabassum, Tasfia; Hossen, Md. Sagar (Springer, 2020-08-01)
    Nowadays security system is being with more important issues. In modern science, technology is updated day by day and we are getting insecure in our daily life. Through this project, a digital signature authentication ...
  • Hossen, Md. Sagar; Tabassum, Tasfia; Islam, Md. Ashiqul; Karim, Rafat; Rumi, Laila Sultana; Kobita, Aysha Akter (Springer, 2020-08-01)
    Nowadays, each and every system needs proper security. Only proper security can save important documents. There are different types of security systems that people use for safety. Digital Signature is one kind of a security ...
  • Hossen, Md. Sagar; Tabassum, Tasfia; Islam, Md. Ashiqul; Karim, Rafat; Rumi, Laila Sultana; Kobita, Aysha Akter (Springer, 2021)
    Nowadays, each and every system needs proper security. Only proper security can save important documents. There are different types of security systems that people use for safety. Digital Signature is one kind of a security ...
  • Kader, Nasimul (Daffodil International University, 2023-09-12)
    With the ever-increasing demand for global interconnectivity in digital communication, ensuring robust privacy and security during online information sharing has become paramount. However, existing methods such as cryptography ...
  • Yang, Yi; Yeo, Kheng Cher; Azam, Sami; Karim, Asif; Ahammad, Ronju; Mahmud, Rakib (Proceedings of the 5th International Conference on Communication and Electronics Systems, ICCES, 2020-07-10)
    Computer password was first used at the Massachusetts Institute of Technology around 1960 when researchers built a large-scale time-sharing computer called CTSS (Compatible Time Sharing System). There are many purposes ...
  • Dey, Samrat Kumar; Uddin, Md. Raihan; Kabir, Kh. Mohaimenul; Rahman, Md. Mahbubur (IEEE, 2018-01-15)
    Paradigms of Cloud computing are gaining prevalent acceptance due to the numerous benefits they provide. These comprise cost-effectiveness, time savings and effective deployment of computing resources. However, privacy and ...
  • Bhuiyan, Touhid; Sarower, Afjal H.; Hassan, Maruf; Karim, Rashed (IEEE, 2019-12-23)
    Least Significant Bit replacement, a spatial domain algorithm, is the most popular and widely used technique in image steganography due to its simplicity and effectiveness. Different methods of data hiding in spatial domain ...
  • Khan, Md. Abbas Ali; Hanif Ali, Mohammad; Haque, A.K.M Fazlul; Sharmin, Farah; Jabiullah, Md. Ismail (2020 18th International Conference on ICT and Knowledge Engineering (ICT&KE), IEEE, 2020-12-25)
    Internet of Things (IOT) is a system that allows to connect the computing devices without the help of human-to-human or human-to-computer interaction. This paper proposes an app-based remote access control door lock security ...
  • Muntasir, Mohammad Fahim (Daffodil International University, 23-03-18)
    With the widespread use of digital communication operated by the need for ever-increasing interconnectedness and global events, the necessity for greater privacy and security during online information sharing is evident, ...
  • Seam, Md. Seamul Islam; Islam, Md. Moktarul; Miah, Mohammad Badrul Alam; Paul, Bikash Kumar; Uddin, Muhammad Shahin; Ahmed, Kawsar (2019 IEEE International Conference on Signal Processing, Information, Communication & Systems (SPICSCON), IEEE, 2020-04-16)
    The proposed paper is reported image encryption and decryption using a new random number generator technique named Seam's Random Number (SRN) generator. The generated random sequences perform XOR operation with gray scale ...

Search DSpace

Browse

My Account