Ariel M. Sison

According to our database1, Ariel M. Sison authored at least 32 papers between 2011 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Multilayer Security for Facial Authentication to Secure Text Files.
Proceedings of the Intelligent Systems and Applications, 2021

2020
Cryptographic Randomness Test of the Modified Hashing Function of SHA256 to Address Length Extension Attack.
Proceedings of the ICCBN 2020: 8th International Conference on Communications and Broadband Networking, 2020

Cryptanalysis of the Modified SHA256.
Proceedings of the HPCCT & BDAI 2020: 4th High Performance Computing and Cluster Technologies Conference & 3rd International Conference on Big Data and Artificial Intelligence, 2020

Extended PrefixSpan for Efficient Sequential Pattern Mining in a Game-based Learning Environment.
Proceedings of the APIT 2020: 2nd Asia Pacific Information Technology Conference, 2020

2019
Modifying Bit-Level Data Compression Scheme based on Adaptive Hamming Code Data Compression Algorithm.
Proceedings of the International Conference on Multimedia Analysis and Pattern Recognition, 2019

Implementation and Performance Assessment of Enhanced RC5 Cryptosystem Applied to Different File Types.
Proceedings of the 9th IEEE International Conference on System Engineering and Technology, 2019

An Enhanced Key Security of Playfair Cipher Algorithm.
Proceedings of the 8th International Conference on Software and Computer Applications, 2019

Implementation of Enhanced MD5 Algorithm using SSL to Ensure Data Integrity.
Proceedings of the 3rd International Conference on Machine Learning and Soft Computing, 2019

Jumbled passsteps: a hotspot guessing attack resistant graphical password authentication scheme based on the modified passmatrix method.
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019

Multidimensional key RC6 algorithm.
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019

An XBOX-based key generation technique for vigenere algorithm.
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019

Enhanced key generation algorithm of hashing message authentication code.
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019

A Secured RFID Lightweight Authentication Protocol based on Elliptic Curve Cryptography using modified PRNG Algorithm.
Proceedings of the 2nd International Conference on Computing and Big Data, 2019

Handling Imbalanced Data through Affinity Propagation and SMOTE.
Proceedings of the 2nd International Conference on Computing and Big Data, 2019

A Secure Key Scheduling Operation for International Data Encryption Algorithm using Serpent Key Schedule Operation.
Proceedings of the 2nd International Conference on Computing and Big Data, 2019

GISKOP: A Modified Key Scheduling Operation of International Data Encryption Algorithm using Serpent Key Scheduling.
Proceedings of the 2nd International Conference on Computing and Big Data, 2019

A Modified Least Significant Bit Randomized Embedding Method based on Image Partitioning and Columnar Transposition with Encryption.
Proceedings of the 2nd International Conference on Computing and Big Data, 2019

Centroid 360: An Enhanced Centroid Initialization Method for K Means Algorithm.
Proceedings of the 2nd International Conference on Data Science and Information Technology, 2019

Performance Analysis of the Modified Generated S-Box for Advanced Encryption Standards.
Proceedings of the 2nd International Conference on Data Science and Information Technology, 2019

ERC5a - An Enhanced RC5 Algorithm on Bit Propagation in the Encryption Function.
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019

An Enhanced Recommendation Algorithm Based on Modified User-Based Collaborative Filtering.
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019

Application of the Modified Imputation Method to Missing Data to Increase Classification Performance.
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019

2018
Bandwidth Allocation Mechanism based on Users' Web Usage Patterns for Campus Networks.
Int. J. Commun. Networks Inf. Secur., 2018

A New Approach in Expanding the Hash Size of MD5.
Int. J. Commun. Networks Inf. Secur., 2018

A Hybrid Prediction Model Integrating a Modified Genetic Algorithm to K-means Segmentation and C4.5.
Proceedings of the TENCON 2018, 2018

Implementation of GA-Based Feature Selection in the Classification and Mapping of Disaster-Related Tweets.
Proceedings of the 2nd International Conference on Natural Language Processing and Information Retrieval, 2018

A New Advanced Encryption Standard-Butterfly Effect in Protecting Image of Copyright Piracy.
Proceedings of the 6th International Conference on Information Technology: IoT and Smart City, 2018

An MD5-Hirose Hashing Algorithm for Digital Image Watermarking.
Proceedings of the 6th International Conference on Information Technology: IoT and Smart City, 2018

Application of enhanced expectation maximization (EnEM) algorithm for image segmentation.
Proceedings of the 2018 International Conference on Data Science and Information Technology, 2018

Enhanced RC6 permutation-diffusion operation for image encryption.
Proceedings of the 2018 International Conference on Data Science and Information Technology, 2018

2011
Data Extraction Using Preprocessing Compression Based on LZW to Improve DB Performance.
Proceedings of the 9th International Conference on Software Engineering Research, 2011

An Improved Data Encryption Standard to Secure Data Using Smart Cards.
Proceedings of the 9th International Conference on Software Engineering Research, 2011


  Loading...