Search Results - (( developing security through algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar by Jaafar, Mohd Izhar

    Published 2012
    “…New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Hybrid cryptography algorithm to improve security cloud storage by Abd Almohsen, Inam Razzaq

    Published 2017
    “…To improve secure of data in cloud storage by hybrid three algorithms (AES, ECC and RSA).All the existing algorithms has some sort of problems and issues, this had made us decide to develop a safe, correct ad efficient algorithm for having secured data in cloud storage. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Encrypted mobile messaging application using 3D-AES block cipher cryptography algorithm / Aida Najihah Mohd Khlubi by Mohd Khlubi, Aida Najihah

    Published 2019
    “…This paper analyzes how information sent through mobile messaging application is being secured. …”
    Get full text
    Get full text
    Student Project
  4. 4

    Information Security Analysis and Solution using LSB Steganography and AES Cryptographic Algorithm by Nurul Adha, Oktarini Saputri, Novita Epa, Sari

    Published 2023
    “…Through the development of a system to improve the security and confidentiality of data in the form of critical messages, this study seeks to provide senders with solutions. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    CleverSecure ONLINE System by Ab. Kadir, Shamimi

    Published 2008
    “…CleverSecure Online System (COS) implements on the use of popular algorithm which is Blowfish algorithm to encrypt and decrypt the data that can be save in directory or send through email. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    A study on one way hashing function and its application for FTMSK webmail / Mohd Rosli Mohd Daud by Mohd Daud, Mohd Rosli

    Published 2007
    “…Encryption need to be done on the client side on client server architecture to obtain secure password during transmission. One type of encryption is 'one-way hashing function' which consists of several algorithms such as Message Digests (MD), Secure Hash Algorithm (SHA) and RIPEMD etc. …”
    Get full text
    Get full text
    Research Reports
  8. 8
  9. 9

    Hide information usings cryptography based on android platform / Ahmad Farhan Ahmad Husni by Ahmad Husni, Ahmad Farhan

    Published 2013
    “…To solve the problem, a steganography tool is developed to help to hide the secret message before being sent through the internet. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Second Level Password Generator by Tay, Choo Chuan, Sakidin, Hamzah, Herman, Nanna Suryana, Baharon, Mohd Rizuan

    Published 2010
    “…Cryptography is an art to convert a message into other forms by using some algorithms. It is used widely in many fields such as securing message before sending through email, sending confidential documents or letters through networks, doing business online and etc. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Secured electrocardiograph (ECG) signal using fully homomorphic encryption technique by Shaikh, Muhammad Umair, Ahmad, Siti Anom, Wan Adnan, Wan Azizun

    Published 2020
    “…Development of secured ECG signal is essential to protect patients’ confidentially and to prevent mistreatment. …”
    Get full text
    Get full text
    Article
  12. 12

    Doctor-patient remote consultation system with secure medical images by Teh, Yee Heng

    Published 2022
    “…The smallest size with the fastest computational speed was selected and through the result, the selected algorithm was DNA encoding.…”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  13. 13
  14. 14

    Hardware Implementation Of Rc4a Stream Cipher Algorithm by Al Noman, Abdullah

    Published 2007
    “…The hardware implementation of cryptographic algorithms plays an important role because of growing requirements of high speed and high level secure communications. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Lattice-based cryptography: the dots that provide information security by Arif Mandangan, Hailiza Kamarulhaili, Muhammad Asyraf Asbullah, Che Haziqah Che Hussin

    Published 2023
    “…Alternatively, most of the current cryptographic schemes are developed based on hard mathematical problems believed to be as unaffected by Shor’s quantum algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  16. 16

    Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh by Mohammed Saleh, Mohammed Ahmed

    Published 2016
    “…In the first and second methods, the visual video information is secured by encrypting limited transformed coefficients using AES algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…We aim to improve on passwords with respect to both usability as well as security. It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Steady state security analysis using artificial neural network by Mohd Nor, Nurul Huda

    Published 2008
    “…The cases where operating violations are observed are considered as alert , while the cases for which the load flow algorithm exhibits a diverging algorithmically solution, are considered as emergency. …”
    Get full text
    Get full text
    Student Project
  19. 19

    WEBCAM MOTION DETECTION USINGVISUAL BASIC by Abdullah, Ilyana

    Published 2005
    “…Combination of several related algorithms helps in developing the skin tones algorithm. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin by Mohd Nordin, Ahmad Nasreen Aqmal

    Published 2024
    “…The implementation phase focuses on the deployment of the Decision Tree algorithm and system evaluation through functionality testing. …”
    Get full text
    Get full text
    Thesis