Search Results - (( based encryption growth algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- growth algorithm »
- java implication »
-
1
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…These algorithms are being used as encryption algorithm in Encapsulated Security Payload (ESP) protocol. …”
Get full text
Get full text
Conference or Workshop Item -
2
Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri
Published 2021“…Encryption and decryption are used for image-based authentication here. …”
Get full text
Get full text
Student Project -
3
Implementation of a Symmetric Chaotic Encryption Scheme
Published 2004“…Due to the promising prospect ofchaotic encryption in the field ofcryptography, and the lack ofimplementation ofthis new encryption-decryption algorithm, this project focuses on introducing a new symmetric encryption-decryption scheme based on a chaos system for VoIP.…”
Get full text
Get full text
Final Year Project -
4
Image steganography for encryption over network security
Published 2017“…The rapidly growth of Internet has increase the data being exchanged through various type of network. …”
Get full text
Get full text
Student Project -
5
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003“…More specifically, these include encryption, decryption, authentication, digital signature algorithms and message-digest functions. …”
Get full text
Get full text
Thesis -
6
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
Get full text
Get full text
Get full text
Thesis -
7
-
8
Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment
Published 2024“…The result shows that the proposed method improves the security problem of the system, the message-digest algorithm (MD5) is used to encrypt the user password, and a strict role authorisation system is designed to realise the access and manage the system�s security. � 2023 by author(s). …”
Article -
9
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
10
Towards cryptanalysis of prime numbers
Published 2016“…Natural numbers that defy decomposition into factors lower than themselves provide the basis for entrenching security in the public key encryption world. A variant algorithm of trial division of sieve of Eratosthenes, with its digits split into two unequal components and whose growth centered on displacement from its immediate neighbors (i.e., Polignac and Goldbach theorems) was fashioned out. …”
Get full text
Get full text
Conference or Workshop Item -
11
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
12
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
Published 2004“…To identify the best cryptographic algorithm suitable for smartcard applications, the dissertation also investigates the implementation of Elliptic Curve encryption techniques and presents performance comparisons based on similar techniques. …”
Get full text
Get full text
Thesis
