DSpace Repository

Browsing Articles by Subject "Cryptography"

Browsing Articles by Subject "Cryptography"

Sort by: Order: Results:

  • Khan, Md. Abbas Ali; Ali, Mohammad Hanif; Haque, A. K. M. Fazlul; Debnath, Chandan; Jabiullah, Md. Ismail; Rahman, Md. Riazur (Scopus, 2021)
    In the twenty-first century, a human being is passing through the world with generosity of technology and most of it’s the systems are being operated by automated or remote access control. However, sensor technology is ...
  • Ferdows, Jannatul; Mehedi, SK. Tanzir; Hossain, A.S.M. Delowar; Shamim, Abdullah Al Mamun; Rasiq, G.M. Rasiqul Islam (A Comprehensive Study of IoT Application Layer Security Management, IEEE, 2021-01-01)
    IoT is a revolution of a new era. In all of this applications data transfer from machine to machine, machine to human. Between this transection of data should ensure security. This technology makes human life easy but ...
  • Islam, Md. Ashiqul; Kobita, Aysha Akter; Hossen, Md. Sagar; Rumi, Laila Sultana; Karim, Rafat; Tabassum, Tasfia (Evolutionary Computing and Mobile Sustainable Networks. Lecture Notes on Data Engineering and Communications Technologies, Springer, 2020-08-01)
    Recently, a strong security system is very important for a safe banking system. To prevent hacking of important information of bank and client, a secure banking system is a must. This paper deals with a strong security ...
  • Islam, Md. Ashiqul; Kobita, Aysha Akter; Hossen, Md. Sagar; Rumi, Laila Sultana; Karim, Rafat; Tabassum, Tasfia (Springer, 2021)
    Recently, a strong security system is very important for a safe banking system. To prevent hacking of important information of bank and client, a secure banking system is a must. This paper deals with a strong security ...
  • Islam, Md. Ashiqul; Tabassum, Tasfia; Hossen, Md. Sagar; Hossain, Shahed; Hossain, Mosharof; Jony, Anik Hassan (IEEE, 2020-11)
    presently a day’s data dissemination over the world become progressively simpler because of quick web and advancement of various kind of technology, for this explanation individuals become increasingly stressed about their ...
  • Karim, Rafat; Rumi, Laila Sultana; Islam, Md. Ashiqul; Kobita, Aysha Akter; Tabassum, Tasfia; Hossen, Md. Sagar (Springer, 2020-08-01)
    Nowadays security system is being with more important issues. In modern science, technology is updated day by day and we are getting insecure in our daily life. Through this project, a digital signature authentication ...
  • Hossen, Md. Sagar; Tabassum, Tasfia; Islam, Md. Ashiqul; Karim, Rafat; Rumi, Laila Sultana; Kobita, Aysha Akter (Springer, 2020-08-01)
    Nowadays, each and every system needs proper security. Only proper security can save important documents. There are different types of security systems that people use for safety. Digital Signature is one kind of a security ...
  • Hossen, Md. Sagar; Tabassum, Tasfia; Islam, Md. Ashiqul; Karim, Rafat; Rumi, Laila Sultana; Kobita, Aysha Akter (Springer, 2021)
    Nowadays, each and every system needs proper security. Only proper security can save important documents. There are different types of security systems that people use for safety. Digital Signature is one kind of a security ...
  • Yang, Yi; Yeo, Kheng Cher; Azam, Sami; Karim, Asif; Ahammad, Ronju; Mahmud, Rakib (Proceedings of the 5th International Conference on Communication and Electronics Systems, ICCES, 2020-07-10)
    Computer password was first used at the Massachusetts Institute of Technology around 1960 when researchers built a large-scale time-sharing computer called CTSS (Compatible Time Sharing System). There are many purposes ...
  • Bhuiyan, Touhid; Sarower, Afjal H.; Hassan, Maruf; Karim, Rashed (IEEE, 2019-12-23)
    Least Significant Bit replacement, a spatial domain algorithm, is the most popular and widely used technique in image steganography due to its simplicity and effectiveness. Different methods of data hiding in spatial domain ...
  • Khan, Md. Abbas Ali; Hanif Ali, Mohammad; Haque, A.K.M Fazlul; Sharmin, Farah; Jabiullah, Md. Ismail (2020 18th International Conference on ICT and Knowledge Engineering (ICT&KE), IEEE, 2020-12-25)
    Internet of Things (IOT) is a system that allows to connect the computing devices without the help of human-to-human or human-to-computer interaction. This paper proposes an app-based remote access control door lock security ...
  • Seam, Md. Seamul Islam; Islam, Md. Moktarul; Miah, Mohammad Badrul Alam; Paul, Bikash Kumar; Uddin, Muhammad Shahin; Ahmed, Kawsar (2019 IEEE International Conference on Signal Processing, Information, Communication & Systems (SPICSCON), IEEE, 2020-04-16)
    The proposed paper is reported image encryption and decryption using a new random number generator technique named Seam's Random Number (SRN) generator. The generated random sequences perform XOR operation with gray scale ...

Search DSpace


Browse

My Account