Search Results - (( develop finding encryption algorithm ) OR ( java application system algorithm ))

Refine Results
  1. 1

    Encrypted email using 3D AES block cipher algorithm / Khairah Mohd Wi by Mohd Wi, Khairah

    Published 2015
    “…There are three objective designed: To identify an encrypted email application development of 3D AES block cipher algorithm and hash process, to develop encrypted email using 3D AES process on email and lastly to measure the validity of the encrypted & decrypted email message by comparing the hash value generate before encrypt and after decrypt. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption by Nurnajmin Qasrina Ann, Ayop Azmi

    Published 2023
    “…Then, the developed algorithm is implemented to estimate the parameters of the Lorenz system. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar by Jaafar, Mohd Izhar

    Published 2012
    “…It have increase complexity of process encryption and decryption. New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Cryptanalysis and design of chaos based image encryption schemes by Wong , Kuan Wai

    Published 2025
    “…Similarly, a chosen plaintext attack on Ping et al.’s scheme reveals a reduced key space of 2216.51, down from the claimed 2356, and identifies inefficiencies in its Henon map-based sequential encryption method. These findings emphasize the need for a more comprehensive analysis of encryption schemes that utilize genetic algorithm and sequential encryption techniques. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5
  6. 6
  7. 7
  8. 8

    Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM) by Shuwandy, Moceheb Lazam

    Published 2012
    “…In the end of 2010 the researcher Engineer Moceheb Lazam during his studies at the Masters in the Universiti Utara Malaysia, develop this algorithm in order to keep the encryption and decoding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Advanced Encryption Standard Mobile Application to Improve College Entrance Security in UNIMAS by Azlina, Ahmadi Julaihi, Ping Ping, Tan, Fateen Afeefa, Md Nor

    Published 2022
    “…This paper implements improved entrance security with the Advanced Encryption Standard (AES) algorithm. In addition, this solution also ensures the confidentiality of the visitors’ data. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  10. 10

    Advanced Encryption Standard Mobile Application to Improve College Entrance Security in UNIMAS by Azlina, Ahmadi Julaihi, Ping Ping, Tan, Fateen Afeefa, Md Noor

    Published 2022
    “…This paper implements improved entrance security with the Advanced Encryption Standard (AES) algorithm. In addition, this solution also ensures the confidentiality of the visitors’ data. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  13. 13
  14. 14
  15. 15
  16. 16

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  17. 17

    An overview: Theoretical and mathematical perspectives for advance Encryption standard/Rijndael by Zaidan, A.A., Zaidan, B.B., Al-Frajat, Ali K., Jalab, Hamid Abdullah

    Published 2010
    “…This overview for advance encryption standard achieving a flexibility and uncomplicated handle with this algorithm, which is a challenge of researchers when be used as implementation. © 2010 Asian Network for Scientific Information.…”
    Get full text
    Get full text
    Article
  18. 18

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…The possible applications of multimedia-networked system are endless, as the demand to support interactive communication among groups of users has increased significantly. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation by Hassan Disina, Abdulkadir

    Published 2018
    “…To archive that, some algorithms adopt the use of matrixes such as quasigroup, Hybrid cubes and substitution box (S-box) to generate the encryption keys. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis