Search Results - (( data practical encryption algorithm ) OR ( java application optimisation algorithm ))

Refine Results
  1. 1
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security by H. Belgassem, Seddeq

    Published 2004
    “…Performance has always been the most critical characteristic of a cryptographic algorithm, which determines its effectiveness. In this research the most popular and used algorithm, which is RSA, is implemented with a new modification in order to reduce the calculation time of the algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A survey of homomorphic encryption for outsourced big data by Tan, Soo Fun, Azman Samsudin

    Published 2016
    “…Finally, this paper discusses the current implementation, challenges, and future direction towards a practical homomorphic encryption scheme for securing outsourced Big Data computation.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Implementation of Grid Computing for Cryptosystem (RSA) by Abd Wahab, Mohamed Ferdaus

    Published 2005
    “…The RSA algorithm can be used for both public key encryption and digital signatures. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Comparison of ECC and RSA algorithms in IOT devices by Vahdati, Zeinab, Md Yasin, Sharifah, Nesheli, Ali Ghasempour, Salehi, Mohammad

    Published 2019
    “…Hence, thoughtfully chosen and practically tested encryption algorithm must be performed to enhance the device efficiency and decrease the risk of sensitive data exposure. …”
    Get full text
    Get full text
    Article
  8. 8

    AAβ public-key cryptosystem - a practical implementation of the new asymmetric by Mahad, Zahari, Kamel Ariffin, Muhammad Rezal

    Published 2013
    “…We show the working of the AAβ algorithm purely from a practical standpoint to justify if it is practically implementable even for large data sets operating on large key sizes.…”
    Get full text
    Get full text
    Article
  9. 9

    Verilog design of a 256-bit AES crypto processor core by Lai, Yit Pin

    Published 2007
    “…Cryptography is the practice to protect one’s information through encryption. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    AAβ public key cryptosystem - a new practical asymmetric implementation based on the square root problem by Mahad, Zahari, Kamel Ariffin, Muhammad Rezal

    Published 2012
    “…We show the working of the AAβ algorithm purely from a practical standpoint to justify if it is practically implementable even for large data sets operating on large key sizes.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Cryptographic Algorithm Using Matrix Inversion as Data Protection by Zirra, Peter B., Wajiga, G.M.

    Published 2011
    “…The algorithms were tested with samples of real data and the result practically demonstrated how systems of non-linear equations turned into linear equations are indeed of relevance in providing strong and complex encryption and decryption keys to protect sensitive information in store or in transit via unsecure channels. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Feasibility of quantum cryptography with AES for secure communication by Mustaffa, Nurul Muzfirah, Mat Daud, Nurulain Balqis, Sase, Takumi

    Published 2026
    “…Traditional encryption techniques face serious threats from the rapid development of quantum computing, which could soon compromise many classical algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    A Hybrid Chaotic Image Encryption Scheme Bas~d on S-Box and Ciphertext Feedback by MUHAMMAD ASIM

    Published 2007
    “…Due to some intrinsic features of images, such as bulk data capacity and high correlation among pixels, traditional encryption algorithms such as IDEA, DES and AES are not suitable for practical image encryption, especially for real time applications. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…ECC encrypts and transfers the private keys as AES private keys in the proposed scheme, while AES encrypts the plain text (communication data). …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Enhancing speed performance of the cryptographic algorithm based on the lucas sequence by M. Abulkhirat, Esam

    Published 2003
    “…More specifically, these include encryption, decryption, authentication, digital signature algorithms and message-digest functions. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  18. 18

    Secure lightweight client for cloud-based E-Health Model by Zhang, Xiaowei

    Published 2023
    “…This algorithm verifies the identity and permission of non-group members to meet the strict privacy protection requirements of EHRs data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases by Imam, A.A., Basri, S., Gonzalez-Aparicio, M.T., Balogun, A.O., Kumar, G.

    Published 2022
    “…In this paper, a new method is introduced into the NoSQL design practice. This method utilizes the Asymmetric encryption algorithm, RSA in particular. …”
    Get full text
    Get full text
    Conference or Workshop Item