Search Results - (( developing index encryption algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- developing index »
- index encryption »
- java application »
-
1
Implementation of a parallel XTS encryption mode of operation
Published 2014Get full text
Get full text
Get full text
Article -
2
Data hiding in medical images using encryption and steganography techniques
Published 2019Get full text
Get full text
Get full text
Undergraduates Project Papers -
3
-
4
Security in robot operating system (ROS) by using Advanced Encryption Standard (AES)
Published 2018Get full text
Get full text
Get full text
Undergraduates Project Papers -
5
-
6
A study of watermarking methods in medical application
Published 2004“…The three methods of medical image watermarking that have been studied are Least Significant Bit (LSB), Rivest, Shamir and Adleman (RSA) encryption and decryption with LSB, RSA encryption and decryption with feature-based. …”
Get full text
Get full text
Thesis -
7
-
8
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
9
Systematic literature review: Trend analysis on the design of lightweight block cipher
Published 2024journal::journal article -
10
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network
Published 2016“…The proposed model is developed and simulated on Matlab based on an improved fuzzy vault scheme with a lightweight error correction algorithm to reduce the computational complexity when compared to previous work. …”
Get full text
Get full text
Get full text
Get full text
Thesis
