Search alternatives:
user encryption » secure encryption (Expand Search)
Showing 1 - 4 results of 4 for search 'user encryption algorithm', query time: 0.03s Refine Results
  1. 1

    Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique by Syeda Tayyaba Bukhari (21842078)

    Published 2024
    “…The research aims to use the elliptic-curve cryptography (ECC) encryption algorithm for storing the seed phrase online by encrypting the seed phrase and using the splitting technique to store the crypto wallet seed phrase. …”
  2. 2

    Privacy Preserving Cancellable Template Generation for Crypto-Biometric Authentication System by Mohd Imran (12249782)

    Published 2025
    “…Our main contribution includes: (a) Secure template generation by Mobius transformation using user keyset (p, q), (b) Securing the user template using permutation and encryption operation. …”
  3. 3

    Improving the security of SNMP in wireless networks by Otrok, H.

    Published 2017
    “…Three very important security features (authentication, encryption, access control) are added to SNMPv3 under the user-based security model (USM). …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  4. 4

    Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey by Faria Nawshin (21841598)

    Published 2024
    “…However, this training process may raise the issue of privacy loss due to the disclosure of<u> sensitive information</u> of the users. Researchers have proposed various techniques to mitigate this issue, such as <u>differential privacy, homomorphic encryption, </u>and<u> federated learning.…”