Search Results - (( developing state encryption algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- developing state »
- state encryption »
- java application »
-
1
Secure mobile AES encryptor (SMAE)
Published 2016“…The purpose of this project is to identify a way to develop a mobile web application for the encryption and decryption of files using the 256 –bit Advanced Encryption Standard (AES) encryption algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
2
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…ECC, AES, and RSA algorithms will be used to encrypt the files to enhance security data on the cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
4
Performance Analysis of Advanced Encryption Standards for Voice Cryptography with Multiple Patterns
Published 2025“…This work will be exploited in our upcoming research to enhance AES performance by developing new encryption algorithm. ? 2024 The authors.…”
Article -
5
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
6
Secure block cipher inspired by the human immune system
Published 2012“…Symmetric encryption block cipher is an important cryptographic algorithm and the quest of enhancing data security is crucial due to the heavy usage of internet and mobile devices worldwide. …”
Get full text
Get full text
Thesis -
7
-
8
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
9
Simulation-Based Power Estimation for High Throughput SHA-256 Design on Unfolding Transformation
Published 2022“…Several cryptographic SHA-256 hash algorithms have been developed to enhance the performance of data-protection techniques. …”
Get full text
Get full text
Get full text
Proceeding -
10
Secure lightweight client for cloud-based E-Health Model
Published 2023“…The results of this study will remarkably facilitate the development of a practical secure cloud-based eHealth system.…”
Get full text
Get full text
Get full text
Thesis -
11
Emerging Ransomware Attacks: Improvement and Remedies-A Systematic Literature Review
Published 2023“…This literature review investigates the evolving tactics and techniques of ransomware attackers, the complexities of ransomware-as-a-service (RaaS) models, and the increased sophistication of encryption algorithms. Furthermore, this literature review examines a diversity of remedial measures, such as practical security measures, incident comeback frameworks, and legal considerations. …”
Get full text
Get full text
Conference or Workshop Item -
12
Collision probability of one-to-many reversible mapping for IPV6 address generation
Published 2012“…This IPv6 address is generated dynamically using CFB (Cipher Feedback)mode of AES (Advanced Encryption Standard) algorithm based on user identity. …”
Get full text
Get full text
Get full text
Proceeding Paper
