Search Results - (( developing security needs algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing security »
- implication based »
- java implication »
- needs algorithm »
- security needs »
-
1
-
2
Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar
Published 2012“…New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. …”
Get full text
Get full text
Thesis -
3
A block cipher based on genetic algorithm
Published 2016“…Based on the results, it is proven that the new proposed block cipher algorithm has successfully passed all the security requirements needed such as NIST Statistical Test, avalanche effect, cryptanalysis and efficiency to justify that it is a secure block cipher algorithm. …”
Get full text
Get full text
Get full text
Thesis -
4
Security enhancement of digital motion image transmission using hybrid AES-DES algorithm
Published 2023“…Understanding the need to minimize algebraic attacks into the AES, this paper proposes the idea on integrating AES within the Feistel network of DES, hence resulting into the development of the Hybrid AES-DES algorithm. …”
Conference paper -
5
Development of DNA-based dynamic key-dependent block cipher
Published 2015“…The rise in the frequency of attacks against the AES has ot been matched by the level of development in the capabilities of the algorithm to withstand these challenges and make the AES secure and immune to all risks. …”
Get full text
Get full text
Thesis -
6
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…The results show that the new algorithm AES-ECC-RSA (AER) was more secure than the remaining algorithms and it proved to be more secure but needed longer time to encrypt data and decrypt data.…”
Get full text
Get full text
Get full text
Thesis -
7
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Today security is the important thing that we need to transfer data from location to another safely. …”
Get full text
Get full text
Thesis -
8
New approach of cryptography algorithm for e- mail applications
Published 2005“…Today security is the important thing that we need to transpose data from a location to another safely. …”
Get full text
Get full text
Conference or Workshop Item -
9
Securing m-government transmission based on symmetric and asymmetric algorithms: A review
Published 2023“…These services range from public to private bodies and the data transmitted sometimes require authentication and confidentiahty. Thus, the need for data security is inevitable. This study will discuss the security of m-Government using security algorithms and report some literature work in this field to highlight its weaknesses. � 2013 Asian Network for Scientific Information.…”
Article -
10
DEVELOPMENT OF IRIS RECOGNITION SYSTEM
Published 2016“…Uniqueness of iris is proven can increase the security and efficiency of recognition system. The “objective of this” project “is to develop” a secure “iris recognition” algorithm for identification management and access control. …”
Get full text
Get full text
Final Year Project -
11
Lightweight PRINCE algorithm IP core for securing GSM messaging using FPGA
Published 2023“…The weaknesses in GSM security, such as flaws in implementation and cryptography algorithms, still need additional improvements and investigation to enhance the system performance in terms of security, cost and power consumption. …”
Article -
12
A security payment model for financial payment using mykad
Published 2011“…However, to make this payment model accepted by the public, the focus should be made on two issues; trust/security issue and performance issue. A system with security technique named Arbitrary Random Security Algorithm (ARSA) and a one-to-one multithreading model need to be developed in order to accelerate the authentication response time of MPM. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
A new 128-bit block cipher
Published 2009“…Even though there have been so much development of the block cipher, the industry still requires another block cipher as long as security features are met. …”
Get full text
Get full text
Thesis -
14
Analysis of parabolic antennas for radio telescopes and the development of encryption methods for radio astronomical images
Published 2022“…Existing algorithms in image security were developed based on Latin squares, DNA sequence etc. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
A study on one way hashing function and its application for FTMSK webmail / Mohd Rosli Mohd Daud
Published 2007“…One type of encryption is 'one-way hashing function' which consists of several algorithms such as Message Digests (MD), Secure Hash Algorithm (SHA) and RIPEMD etc. …”
Get full text
Get full text
Research Reports -
16
Adaptive artificial neural network for power system security assessment and control action
Published 2012“…Furthermore,an AANN for power system security assessment was developed for steady state and dynamic security assessments. …”
Get full text
Get full text
Thesis -
17
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…This research aim is to study the performance of an improvised Genetic Algorithm (GA) by formulating its problem-specific algorithm for network intrusion problem. …”
Get full text
Get full text
Thesis -
18
An Improved Rectangle Lightweight Block Cipher Based On 3d Rotation Method
Published 2024thesis::doctoral thesis -
19
-
20
Improving Extreme Programming Framework With Security Concerns For E-Commerce Applications
Published 2024thesis::doctoral thesis
