Search Results - (( developing science encryption algorithm ) OR ( java implementation using algorithm ))
Search alternatives:
- implementation using »
- java implementation »
- developing science »
- using algorithm »
-
1
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
2
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
3
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Web page application was programmed by Java Enterprise Edition (J2EE). Signatory however use a special Digital Signature Application which store the secret private key. …”
Get full text
Get full text
Thesis -
4
Secure E-Voting With Blind Signature
Published 2003“…E-Voting is implemented by employing Java socket technology and BouncyCastle cryptography provider. …”
Get full text
Get full text
Conference or Workshop Item -
5
Implementation of a parallel XTS encryption mode of operation
Published 2014Get full text
Get full text
Get full text
Article -
6
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
7
-
8
-
9
-
10
-
11
-
12
A hybrid database encryption algorithm based on reverse string and dynamic key
Published 2016Get full text
Get full text
Conference or Workshop Item -
13
-
14
An overview of video encryption techniques
Published 2010Get full text
Get full text
Get full text
Article -
15
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
16
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
17
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
18
An analysis of lowest energy consumption (CPU time) through running several cryptography algorithms with different video formats
Published 2023“…It may similarly be described as the science that utilizes mathematics in decryption and encryption data processes. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
VHDL implementation of DES algorithm / Emmanvel Kajan Mering
Published 2004Get full text
Get full text
Thesis -
20
