Search Results - (( developing science encryption algorithm ) OR ( java implementation learning algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- developing science »
- learning algorithm »
-
1
Implementation of a parallel XTS encryption mode of operation
Published 2014Get full text
Get full text
Get full text
Article -
2
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
3
-
4
-
5
-
6
-
7
-
8
A hybrid database encryption algorithm based on reverse string and dynamic key
Published 2016Get full text
Get full text
Conference or Workshop Item -
9
-
10
An overview of video encryption techniques
Published 2010Get full text
Get full text
Get full text
Article -
11
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
12
An analysis of lowest energy consumption (CPU time) through running several cryptography algorithms with different video formats
Published 2023“…It may similarly be described as the science that utilizes mathematics in decryption and encryption data processes. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
VHDL implementation of DES algorithm / Emmanvel Kajan Mering
Published 2004Get full text
Get full text
Thesis -
14
-
15
-
16
Design and implementation of advanced encryption standard using verilog HDL
Published 2022Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
-
18
Doctor-patient remote consultation system with secure medical images
Published 2022“…The result was recorded including the run time and encrypted image size. The final selection of the algorithms depended on the encryption size and computation speed. …”
Get full text
Get full text
Get full text
Academic Exercise -
19
-
20
Investigation of data encryption algorithm for secured transmission of electrocardiograph (ECG) signal
Published 2018Get full text
Get full text
Conference or Workshop Item
