Search Results - (( basic integrated security algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- basic integrated »
- java application »
-
1
Developing a secure mechanism for Bluetooth-based Wireless Personal Area Networks (WPANs)
Published 2007“…The basic security architecture of Bluetooth, operating at the link layer, is augmented with a higher application layer security mechanism for authentication and message integrity. …”
Get full text
Get full text
Get full text
Proceeding Paper -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
4
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
5
Automatic prehension using an accelerometer and force sensor
Published 2005“…Experimental results are presented for the acceleration and the subsequent integrations. Having the necessary components identified, built and tested, the apparatus can be used to investigate automatic control algorithms for secure grips on objects.…”
Get full text
Get full text
Conference or Workshop Item -
6
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
7
A new 128-bit block cipher
Published 2009“…One of the critical areas is, secured communication which helps to protect the confidentiality and integrity of information during transmission and storage. …”
Get full text
Get full text
Thesis -
8
Trust based Lightweight Security Protocol for Device to Device Multihop Cellular Communication
Published 2020“…Discrete logarithm analysis shows that TLwS is secure against the current security algorithms as well as quantum attacks. …”
Get full text
Get full text
Thesis -
9
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
Get full text
Get full text
Thesis -
10
Developing a prototype e-commerce application with credit card validation and secure transaction
Published 2005“…Anyhow,the problem with e-commerce application is that many of them are not secure.This application is designed to enhance the e-commerce applications with additional security items.The security enhancement made was integrating an encryption module that secures the data that are stored in the databases. …”
Get full text
Get full text
Undergraduates Project Papers -
11
Improving Extreme Programming Framework With Security Concerns For E-Commerce Applications
Published 2024thesis::doctoral thesis -
12
Application of Mellin-Kamal transformation in EL Gamal Ciphertext Cryptosystem / Nurul Syazwani Husairi and Nurul Aqilah Mohd Fauzi
Published 2023“…El Gamal ciphertext cryptosystem is one of the fluently used algorithms to satisfy the security message or data transmission. …”
Get full text
Get full text
Student Project -
13
Crypto Embedded System for Electronic Document
Published 2006“…In this paper, a development of low-cost RSA-based Crypto Embedded System targeted for electronic document security is presented. The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
Get full text
Get full text
Article -
14
-
15
Trust‑based lightweight security protocol for device to device multihop cellular communication (TLwS)
Published 2021“…This proposed scheme utilized elliptic curve and Elgamal cryptosystem assisted with secure hashing algorithm, timestamps, and blindfold challenge for secure communication and key agreements. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
17
Designing an integrated AIOT system for tracking class attendance
Published 2024“…Further enhancements including integrating of night vision cameras and research on face recognition algorithms that utilizes GPU can improve the system performance. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
19
An enhance embedding method using edge and textures detection for image steganography
Published 2024“…The study contributes both theoretically and practically to the field of steganography by developing an innovative algorithm that enhances the security and robustness of image hidden data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
