Search Results - (( developing emerging encryption algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- developing emerging »
- java application »
-
1
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
2
Security in robot operating system (ROS) by using Advanced Encryption Standard (AES)
Published 2018“…In particular, this research focuses on using encryption algorithm which is AES. The encryption algorithm will be evaluated according to the performance of the system, both from computing and communications point of view.…”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
3
-
4
Emerging Ransomware Attacks: Improvement and Remedies-A Systematic Literature Review
Published 2023“…Ransomware has emerged as a serious and evolving cybersecurity threat. …”
Get full text
Get full text
Conference or Workshop Item -
5
Proposed method for enhancing quantum bit error rate using quantum key distribution technique
Published 2014“…Therefore this high error rate needs to be reduced for better security using two channels qkd. With the current emergence of quantum computers many security algorithm that could take classical computer years to break could now be broken in matter of seconds. …”
Get full text
Get full text
Conference or Workshop Item -
6
Development of DNA-based dynamic key-dependent block cipher
Published 2015Get full text
Get full text
Thesis -
7
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
8
Framework for location based attendance system by using fourth industrial revolution (4ir) technologies
Published 2021“…The designed framework proved to be more secure, all the data in the framework was encrypted with a strong encryption algorithm, final attendance of successful students was stored in the blockchain structure to maintain the confidentiality and integrity in data. …”
Get full text
Get full text
Get full text
Article -
9
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
