Search Results - (( developing security needs algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2

    Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar by Jaafar, Mohd Izhar

    Published 2012
    “…New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…Based on the results, it is proven that the new proposed block cipher algorithm has successfully passed all the security requirements needed such as NIST Statistical Test, avalanche effect, cryptanalysis and efficiency to justify that it is a secure block cipher algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Security enhancement of digital motion image transmission using hybrid AES-DES algorithm by Vishnu M.B., Tiong S.K., Zaini M., Koh S.P.

    Published 2023
    “…Understanding the need to minimize algebraic attacks into the AES, this paper proposes the idea on integrating AES within the Feistel network of DES, hence resulting into the development of the Hybrid AES-DES algorithm. …”
    Conference paper
  5. 5

    Development of DNA-based dynamic key-dependent block cipher by Saeed, Auday H.

    Published 2015
    “…The rise in the frequency of attacks against the AES has ot been matched by the level of development in the capabilities of the algorithm to withstand these challenges and make the AES secure and immune to all risks. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Hybrid cryptography algorithm to improve security cloud storage by Abd Almohsen, Inam Razzaq

    Published 2017
    “…The results show that the new algorithm AES-ECC-RSA (AER) was more secure than the remaining algorithms and it proved to be more secure but needed longer time to encrypt data and decrypt data.…”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…Today security is the important thing that we need to transfer data from location to another safely. …”
    Get full text
    Get full text
    Thesis
  8. 8

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…Today security is the important thing that we need to transpose data from a location to another safely. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Securing m-government transmission based on symmetric and asymmetric algorithms: A review by Watari M.A., Zaidan A.A., Zaidan B.B.

    Published 2023
    “…These services range from public to private bodies and the data transmitted sometimes require authentication and confidentiahty. Thus, the need for data security is inevitable. This study will discuss the security of m-Government using security algorithms and report some literature work in this field to highlight its weaknesses. � 2013 Asian Network for Scientific Information.…”
    Article
  10. 10

    DEVELOPMENT OF IRIS RECOGNITION SYSTEM by Mohd Kamarudin, Nur Eliza

    Published 2016
    “…Uniqueness of iris is proven can increase the security and efficiency of recognition system. The “objective of this” project “is to develop” a secure “iris recognition” algorithm for identification management and access control. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Lightweight PRINCE algorithm IP core for securing GSM messaging using FPGA by Abbas Y.A., Jidin R., Jamil N., Z'aba M.R.

    Published 2023
    “…The weaknesses in GSM security, such as flaws in implementation and cryptography algorithms, still need additional improvements and investigation to enhance the system performance in terms of security, cost and power consumption. …”
    Article
  12. 12

    A security payment model for financial payment using mykad by Ahmad Zahari, Nurul Huda

    Published 2011
    “…However, to make this payment model accepted by the public, the focus should be made on two issues; trust/security issue and performance issue. A system with security technique named Arbitrary Random Security Algorithm (ARSA) and a one-to-one multithreading model need to be developed in order to accelerate the authentication response time of MPM. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    A new 128-bit block cipher by Mohd Ali, Fakariah Hani

    Published 2009
    “…Even though there have been so much development of the block cipher, the industry still requires another block cipher as long as security features are met. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Analysis of parabolic antennas for radio telescopes and the development of encryption methods for radio astronomical images by Ting, Kung Chuang

    Published 2022
    “…Existing algorithms in image security were developed based on Latin squares, DNA sequence etc. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    A study on one way hashing function and its application for FTMSK webmail / Mohd Rosli Mohd Daud by Mohd Daud, Mohd Rosli

    Published 2007
    “…One type of encryption is 'one-way hashing function' which consists of several algorithms such as Message Digests (MD), Secure Hash Algorithm (SHA) and RIPEMD etc. …”
    Get full text
    Get full text
    Research Reports
  16. 16

    Adaptive artificial neural network for power system security assessment and control action by Al-Masri, Ahmed Naufal A.

    Published 2012
    “…Furthermore,an AANN for power system security assessment was developed for steady state and dynamic security assessments. …”
    Get full text
    Get full text
    Thesis
  17. 17

    An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi by Suhaimi, Hamizan

    Published 2021
    “…This research aim is to study the performance of an improvised Genetic Algorithm (GA) by formulating its problem-specific algorithm for network intrusion problem. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20