Search Results - (( data integration encryption algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm by Lim, Mui Liang

    Published 2006
    “…There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
    Get full text
    Get full text
    Monograph
  2. 2

    Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen by Shawkat S.A., Tuama B.A., Al-Barazanchi I.

    Published 2023
    “…This increases the security problems in security such as data confidentiality, data integrity and data availability, so the solution of such problems are conducted by adopting data encryption is very important for securing users data. …”
    Article
  3. 3

    Secured agriculture sensor data based on end-to-end encryption using raspberry pi by Choo, Jia Huey

    Published 2025
    “…The system integrates multiple robust encryption algorithms—AES-128, AES-256, ChaCha20, and Twofish—for end-to-end data protection. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4
  5. 5

    Reduction-by-percentage compression technique for reducing sizes of plaintext prior to encryption algorithm by Arif Mandangan, Che Haziqah Che Hussin, Darmesah Gabda, Suriana Lasairaya

    Published 2022
    “…With smaller sizes, the encryption algorithm would process inputs with smaller sizes, and these could potentially make the encryption algorithm be executed in cheaper computational and storage capacity costs.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase by Alaidaros, Hashem Mohammed, A. Rasid, Mohd Fadlee, Othman, Mohamed, Raja Abdullah, Raja Syamsul Azmir

    Published 2007
    “…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Improving security performance with parallel crypto operations in SSL bulk data transfer by Alaidaros, Hashem Mohammed, Othman, Mohamed, A. Rasid, Mohd Fadlee

    Published 2009
    “…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Implementing RC5 Encrtption Algorithm On a Web Based Medical Cosultation System by Khashan, Osama Ahmed Abdelhadi

    Published 2007
    “…The doctor is a server side who's the administrator and responsible to decrypt and manage the data. This study is to deliver the approach of confidentiality, integrity and trust to the patient's medical data.…”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Secure Hybrid Scheme For Securing Mqtt Protocol Based On Enhanced Symmetric Algorithm by Hintaw, Ahmed Jameel

    Published 2023
    “…The proposed cryptosystem utilized two algorithms: a dynamic variant of the Advanced Encryption Standard (D-AES) and Key policy attribute base encryption (KP-ABE). …”
    Get full text
    Get full text
    Thesis
  12. 12

    Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map by Emmanuel Oluwatobi Asani, Godsfavour Biety-Nwanju, Abidemi Emmanuel Adeniyi, Salil Bharany, Ashraf Osman Ibrahim Elsayed, Anas W. Abulfaraj, Wamda Nagmeldin

    Published 2023
    “…Additionally, the Latin square matrix stands out for its uniform histogram distribution, thereby bolstering its encryption's potency. The consequent integration of these algorithms in this study was therefore grounded in the scientific rationale of establishing a strong and resilient cypher technique. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    Protection of the digital Holy Quran hash digest by using cryptography algorithms by Alahmad, Mohammad, Alshaikhli, Imad Fakhri Taha, Moh. Jumaah, Bashayer

    Published 2013
    “…Cryptography is the science of information security that includes symmetric encryption and asymmetric encryption which used to avoid the tampering attempts and guarantee the data integrity. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices by Alomari, Mohammad Ahmed Mohammad

    Published 2017
    “…To ensure higher security level, the developed system is implemented using the NIST-certified XTS-AES block encryption algorithm. Other storage encryption algorithms, i.e. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA by Ahmed, Shakil

    Published 2013
    “…Storage encryption (data at-rest) has now become an important aspect in today’s computing environment. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Secured route optimization in mobile IPv6 wireless networks in terms of data integrity by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm at a cost of a small increase in delay. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri ... [et al.] by Ahmad Zukri, Nurul Hidayah, Kamarudin, Nur Khairani, Izraf Ishak, Mohd Enif, Md Rashid, Nor Aimuni

    Published 2018
    “…This application implements an Advance Encryption Standard (AES) to enhance the steganography security by encrypting the information and as such, only the intended recipient can read the data. …”
    Get full text
    Get full text
    Get full text
    Article