Search Results - (( developing halal function algorithm ) OR ( java based encryption algorithm ))
Search alternatives:
- function algorithm »
- developing halal »
- java »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertext, providing privacy. …”
Get full text
Get full text
Final Year Project -
2
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
3
Message based random variable length key encryption algorithm.
Published 2009“…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
Get full text
Get full text
Article -
4
-
5
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
7
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
Get full text
Get full text
Thesis -
8
The reliability of halal product transportation using GPS tracking system
Published 2016“…A functional prototype device with a web based interface for reporting function was completely built and tested in different kind of situation. …”
Get full text
Get full text
Get full text
Article -
9
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
10
Real time traceability module for halal logistic transportation using GPS and geofence technique
Published 2016“…The verification and simulation report illustrate that the module and improved algorithm has successfully been executed to deliver a report of tracking that is in accordance with the requirements of administering Halal goods. …”
Get full text
Get full text
Thesis -
11
Halal restaurant finder / Khairol Azahar Ramli
Published 2014“…For this application, a survey has been conducted before and after the development of this application. The outcomes of the survey, most of the respondents are interested in Halal restaurant application and they are very satisfied with the function and interface design of Halal Restaurant Finder application. …”
Get full text
Get full text
Thesis -
12
The identification of alcohol percentage limit in halal food using fuzzy logic
Published 2021“…This algorithm and basic framework will be the first step in developing a user-friendly tool that will later benefit the consumer as well as function as an auditor especially in order to control the alcohol content in halal food and beverages.…”
Get full text
Get full text
Get full text
Book Chapter
