Search Results - (( based encryption growth algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 12 results of 12
Refine Results
  1. 1
  2. 2

    Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri by Mohd Asri, Nuha Bakizah

    Published 2021
    “…Encryption and decryption are used for image-based authentication here. …”
    Get full text
    Get full text
    Student Project
  3. 3

    Implementation of a Symmetric Chaotic Encryption Scheme by Sivanandan, Easwari

    Published 2004
    “…Due to the promising prospect ofchaotic encryption in the field ofcryptography, and the lack ofimplementation ofthis new encryption-decryption algorithm, this project focuses on introducing a new symmetric encryption-decryption scheme based on a chaos system for VoIP.…”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Image steganography for encryption over network security by Maimon, Elmy Fadly

    Published 2017
    “…The rapidly growth of Internet has increase the data being exchanged through various type of network. …”
    Get full text
    Get full text
    Student Project
  5. 5

    Enhancing speed performance of the cryptographic algorithm based on the lucas sequence by M. Abulkhirat, Esam

    Published 2003
    “…More specifically, these include encryption, decryption, authentication, digital signature algorithms and message-digest functions. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment by Al-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S.

    Published 2024
    “…The result shows that the proposed method improves the security problem of the system, the message-digest algorithm (MD5) is used to encrypt the user password, and a strict role authorisation system is designed to realise the access and manage the system�s security. � 2023 by author(s). …”
    Article
  9. 9

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Towards cryptanalysis of prime numbers by Yusuf, B.K., Mahmood, A.K., Sulaiman, S.

    Published 2016
    “…Natural numbers that defy decomposition into factors lower than themselves provide the basis for entrenching security in the public key encryption world. A variant algorithm of trial division of sieve of Eratosthenes, with its digits split into two unequal components and whose growth centered on displacement from its immediate neighbors (i.e., Polignac and Goldbach theorems) was fashioned out. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Enhancement of Security Architecture for Smartcard Based Authentication Protocols by Mohammed, Lawan Ahmed

    Published 2004
    “…To identify the best cryptographic algorithm suitable for smartcard applications, the dissertation also investigates the implementation of Elliptic Curve encryption techniques and presents performance comparisons based on similar techniques. …”
    Get full text
    Get full text
    Thesis