Search Results - (( developing event encryption algorithm ) OR ( java application stemming algorithm ))

  • Showing 1 - 2 results of 2
Refine Results
  1. 1

    Genetic algorithm for event scheduling system by Hasan Basari, Abd Samad, Hussin, Burairah, Jalal, Siti Musliza, Mohd Isa, Nabihah

    Published 2010
    “…The system could be more efficient if password encryption is applied and the system is able to reply the message sent by UTeM’s staff asking for further events details.…”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Collision probability of one-to-many reversible mapping for IPV6 address generation by Nashrul Hakiem, Nashrul Hakiem, Siddiqi, Mohammad Umar, Jarot, Sigit Puspito Wigati

    Published 2012
    “…This IPv6 address is generated dynamically using CFB (Cipher Feedback)mode of AES (Advanced Encryption Standard) algorithm based on user identity. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper