Search Results - (( developing security through algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing security »
- through algorithm »
- implication based »
- security through »
- java implication »
-
1
Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar
Published 2012“…New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. …”
Get full text
Get full text
Thesis -
2
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…To improve secure of data in cloud storage by hybrid three algorithms (AES, ECC and RSA).All the existing algorithms has some sort of problems and issues, this had made us decide to develop a safe, correct ad efficient algorithm for having secured data in cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
3
Encrypted mobile messaging application using 3D-AES block cipher cryptography algorithm / Aida Najihah Mohd Khlubi
Published 2019“…This paper analyzes how information sent through mobile messaging application is being secured. …”
Get full text
Get full text
Student Project -
4
Information Security Analysis and Solution using LSB Steganography and AES Cryptographic Algorithm
Published 2023“…Through the development of a system to improve the security and confidentiality of data in the form of critical messages, this study seeks to provide senders with solutions. …”
Get full text
Get full text
Get full text
Article -
5
-
6
CleverSecure ONLINE System
Published 2008“…CleverSecure Online System (COS) implements on the use of popular algorithm which is Blowfish algorithm to encrypt and decrypt the data that can be save in directory or send through email. …”
Get full text
Get full text
Final Year Project -
7
A study on one way hashing function and its application for FTMSK webmail / Mohd Rosli Mohd Daud
Published 2007“…Encryption need to be done on the client side on client server architecture to obtain secure password during transmission. One type of encryption is 'one-way hashing function' which consists of several algorithms such as Message Digests (MD), Secure Hash Algorithm (SHA) and RIPEMD etc. …”
Get full text
Get full text
Research Reports -
8
-
9
Hide information usings cryptography based on android platform / Ahmad Farhan Ahmad Husni
Published 2013“…To solve the problem, a steganography tool is developed to help to hide the secret message before being sent through the internet. …”
Get full text
Get full text
Thesis -
10
Second Level Password Generator
Published 2010“…Cryptography is an art to convert a message into other forms by using some algorithms. It is used widely in many fields such as securing message before sending through email, sending confidential documents or letters through networks, doing business online and etc. …”
Get full text
Get full text
Conference or Workshop Item -
11
Secured electrocardiograph (ECG) signal using fully homomorphic encryption technique
Published 2020“…Development of secured ECG signal is essential to protect patients’ confidentially and to prevent mistreatment. …”
Get full text
Get full text
Article -
12
Doctor-patient remote consultation system with secure medical images
Published 2022“…The smallest size with the fastest computational speed was selected and through the result, the selected algorithm was DNA encoding.…”
Get full text
Get full text
Get full text
Academic Exercise -
13
-
14
Hardware Implementation Of Rc4a Stream Cipher Algorithm
Published 2007“…The hardware implementation of cryptographic algorithms plays an important role because of growing requirements of high speed and high level secure communications. …”
Get full text
Get full text
Thesis -
15
Lattice-based cryptography: the dots that provide information security
Published 2023“…Alternatively, most of the current cryptographic schemes are developed based on hard mathematical problems believed to be as unaffected by Shor’s quantum algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
16
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…In the first and second methods, the visual video information is secured by encrypting limited transformed coefficients using AES algorithm. …”
Get full text
Get full text
Thesis -
17
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…We aim to improve on passwords with respect to both usability as well as security. It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
Get full text
Get full text
Get full text
Thesis -
18
Steady state security analysis using artificial neural network
Published 2008“…The cases where operating violations are observed are considered as alert , while the cases for which the load flow algorithm exhibits a diverging algorithmically solution, are considered as emergency. …”
Get full text
Get full text
Student Project -
19
WEBCAM MOTION DETECTION USINGVISUAL BASIC
Published 2005“…Combination of several related algorithms helps in developing the skin tones algorithm. …”
Get full text
Get full text
Final Year Project -
20
Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin
Published 2024“…The implementation phase focuses on the deployment of the Decision Tree algorithm and system evaluation through functionality testing. …”
Get full text
Get full text
Thesis
