Search Results - (( basic integrated security algorithm ) OR ( java application using algorithm ))
Search alternatives:
- basic integrated »
- java application »
- using algorithm »
-
1
Developing a secure mechanism for Bluetooth-based Wireless Personal Area Networks (WPANs)
Published 2007“…The basic security architecture of Bluetooth, operating at the link layer, is augmented with a higher application layer security mechanism for authentication and message integrity. …”
Get full text
Get full text
Get full text
Proceeding Paper -
2
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
3
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
4
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
5
-
6
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
7
Automatic prehension using an accelerometer and force sensor
Published 2005“…Experimental results are presented for the acceleration and the subsequent integrations. Having the necessary components identified, built and tested, the apparatus can be used to investigate automatic control algorithms for secure grips on objects.…”
Get full text
Get full text
Conference or Workshop Item -
8
A new 128-bit block cipher
Published 2009“…One of the critical areas is, secured communication which helps to protect the confidentiality and integrity of information during transmission and storage. …”
Get full text
Get full text
Thesis -
9
Trust based Lightweight Security Protocol for Device to Device Multihop Cellular Communication
Published 2020“…Discrete logarithm analysis shows that TLwS is secure against the current security algorithms as well as quantum attacks. …”
Get full text
Get full text
Thesis -
10
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
Get full text
Get full text
Thesis -
11
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
13
Developing a prototype e-commerce application with credit card validation and secure transaction
Published 2005“…Anyhow,the problem with e-commerce application is that many of them are not secure.This application is designed to enhance the e-commerce applications with additional security items.The security enhancement made was integrating an encryption module that secures the data that are stored in the databases. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Improving Extreme Programming Framework With Security Concerns For E-Commerce Applications
Published 2024thesis::doctoral thesis -
15
Application of Mellin-Kamal transformation in EL Gamal Ciphertext Cryptosystem / Nurul Syazwani Husairi and Nurul Aqilah Mohd Fauzi
Published 2023“…El Gamal ciphertext cryptosystem is one of the fluently used algorithms to satisfy the security message or data transmission. …”
Get full text
Get full text
Student Project -
16
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Crypto Embedded System for Electronic Document
Published 2006“…In this paper, a development of low-cost RSA-based Crypto Embedded System targeted for electronic document security is presented. The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
Get full text
Get full text
Article -
18
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
19
Trust‑based lightweight security protocol for device to device multihop cellular communication (TLwS)
Published 2021“…This proposed scheme utilized elliptic curve and Elgamal cryptosystem assisted with secure hashing algorithm, timestamps, and blindfold challenge for secure communication and key agreements. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item
