Search Results - (( determining technological encryption algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- determining technological »
- technological encryption »
- implication based »
- java implication »
-
1
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…These algorithms are being used as encryption algorithm in Encapsulated Security Payload (ESP) protocol. …”
Get full text
Get full text
Conference or Workshop Item -
2
Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan
Published 2014“…El-gamal encryption system is an asymmetric key encryption algorithm which is based on the Diffie-Hellman key exchange. …”
Get full text
Get full text
Thesis -
3
-
4
Anti-forensic steganography method based on randomization
Published 2013Get full text
Get full text
Get full text
Article -
5
An e-voting application using cryptography technology
Published 2020Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
7
Asynchronous point to point FSK- FM radio telemetry system with data encryption for monitoring environmental conditions / Shuhaimi Shamsuddin
Published 2003“…The data collected at RTS site are encrypted prior to transmission to the BTS by employing the One Time Pad (OTP) and Caesar Cipher algorithms. …”
Get full text
Get full text
Thesis -
8
-
9
-
10
Implementation and integration of HF messaging system with cryptographic features
Published 2006“…For that purpose, several stream ciphers algorithms such as shrinking, multiplexing and memory generator were analyzed to determine their characteristics. …”
Get full text
Get full text
Get full text
Thesis -
11
Diagnosis security problems in cloud computing for business cloud
Published 2023“…Secondly , they prefer to develop the multi-key cipher algorithm in order to manage the encryption based on the level of security. � 2005 - 2016 JATIT & LLS. …”
Article -
12
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
13
Secure radio telemetry and data acquisition using wireless data communication system with portable UHF transceivers / Mohd Dani Baba and Deepak Kumar Ghodgaonkar
Published 2003“…The data collected at RTS site are encrypted prior to transmission to the BTS by employing the One Time Pad (OTP) and Caesar Cipher algorithms. …”
Get full text
Get full text
Research Reports -
14
