Search Results - (( developing internal encryption algorithm ) OR ( java adaptation optimization algorithm ))
Search alternatives:
- adaptation optimization »
- developing internal »
- internal encryption »
- java adaptation »
-
1
An overview of video encryption techniques
Published 2010Get full text
Get full text
Get full text
Article -
2
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
3
Web-Application for securing message using Steganography with LSB Algorithm and Hybrid Encryption / Muhammad Khairul Amin Mohd Nai and Siti Rahayu Abdul Aziz
Published 2021“…Web-Application for Securing Message using Steganography with LSB Algorithm and Hybrid Encryption is a web application that encrypt the messages user input and hide it in an image file to give an utmost security for the messages to be delivered and received. …”
Get full text
Get full text
Get full text
Book Section -
4
A hybrid database encryption algorithm based on reverse string and dynamic key
Published 2016Get full text
Get full text
Conference or Workshop Item -
5
Web-Application for securing message using Steganography with LSB Algorithm and Hybrid Encryption / Muhammad Khairul Amin Mohd Nai and Siti Rahayu Abdul Aziz
Published 2021“…Web-Application for Securing Message using Steganography with LSB Algorithm and Hybrid Encryption is a web application that encrypt the messages user input and hide it in an image file to give an utmost security for the messages to be delivered and received. …”
Get full text
Get full text
Get full text
Book Section -
6
-
7
Secret channel using video steganography
Published 2017Get full text
Get full text
Get full text
Article -
8
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
9
-
10
-
11
Second Level Password Generator
Published 2010Get full text
Get full text
Conference or Workshop Item -
12
-
13
-
14
-
15
Feasibility of quantum cryptography with AES for secure communication
Published 2026Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
-
17
-
18
Application of Mellin-Kamal transformation in EL Gamal Ciphertext Cryptosystem / Nurul Syazwani Husairi and Nurul Aqilah Mohd Fauzi
Published 2023“…Even though this algorithm alone can satisfy the need of ciphertext cryptosystem, it is vulnerable to numerous internal and external attackers such as logjam and dictionaries attack. …”
Get full text
Get full text
Student Project -
19
Secured route optimization in mobile IPv6 wireless networks in terms of data integrity
Published 2008Get full text
Get full text
Conference or Workshop Item -
20
A new cryptosystem analogous to LUCELG and Cramer-Shoup
Published 2009Get full text
Get full text
Get full text
Article
