Search Results - (( developing bring encryption algorithm ) OR ( java implication tree algorithm ))
Search alternatives:
- developing bring »
- bring encryption »
- java implication »
- implication tree »
- tree algorithm »
-
1
Hide information usings cryptography based on android platform / Ahmad Farhan Ahmad Husni
Published 2013“…DES algorithm uses public-key system means the algorithm for encrypting and decrypting a message is public know. …”
Get full text
Get full text
Thesis -
2
Internet access using encrypted membercard / Muhammad Syafiq Sopian
Published 2021“…The main function of this device is to control input user of client and to also encrypt it with AES algorithm. User need to input the data using barcode scanner that contain ID and password of user. …”
Get full text
Get full text
Student Project -
3
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…Fine-grained access control using Attribute-Based Encryption (ABE) mechanisms can be enforced as the first line of defense on the untrusted cloud to forbid unauthorized access to the stored data. …”
Get full text
Get full text
Thesis -
4
Framework for location based attendance system by using fourth industrial revolution (4ir) technologies
Published 2021“…The designed framework proved to be more secure, all the data in the framework was encrypted with a strong encryption algorithm, final attendance of successful students was stored in the blockchain structure to maintain the confidentiality and integrity in data. …”
Get full text
Get full text
Get full text
Article -
5
SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems
Published 2021“…The proposed scheme extends the Kerberos workflow and utilizes the AES-ECC algorithm for efficient encryption keys management and secure communication between the edge nodes and fog node servers to establish secure mutual authentication. …”
Get full text
Get full text
Article
