Search Results - (( developing ict generation algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1
  2. 2
  3. 3

    Unique class encryption (UCE) substitution boxes (S-Boxes) using mysterious Quranic for block ciphers in ICT security by Shamsudin, Ahmad Faizul, Suhaimi, Mohd Adam, Makarin, Rusydi Hasan, Jaafar, Abi Dzar

    Published 2010
    “…Thus the vital component of the non-parametric UCE block ciphers, that are the S-Boxes were developed. About 13.5 million of 8-Bit S-Boxes were generated. …”
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    Telecardiology system for fourth generation heterogeneous wireless networks by Yew, Hoe Tung, Yudha Aditya, Haikal Satrial, Eko Supriyanto, Yuan, Wen Hau

    Published 2015
    “…With the rapid development of ICT, telecardiology systems now can support high quality medical image and video. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7
  8. 8

    Secure block cipher inspired by the human immune system by Ariffin, Suriyani

    Published 2012
    “…In computer security service, cryptographic algorithm is used to ensure adequate security of the systems or of data transfers. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Enhancing geographic coordinates representation standard for reverse geocoding web services by Al-Habshi, Mohammed Mustafa Abdulrahman

    Published 2018
    “…Although the difference doesn’t show high variation, the research findings provided an evidence and a method that respect and consider counties developed CRS. In addition, a simple table as guidelines was developed to show the bytes size of the decimal digit in scaling. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Cyber vulnerabilities in smart grid and safety measures for energy meters in advanced metering system and smart meter communications by Ayob A., Salim Reza S.M., Hussain A., Saad M.H.M., Amin N.

    Published 2023
    “…It also uses chaos based key generation as well as public key-based authentication techniques. …”
    Article