Search Results - (( developing transaction system algorithm ) OR ( java implication rsa algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Development of a Web Access Control Technique Based User Access Behavior by Abdelrahman, Selmaelsheikh

    Published 2004
    “…This thesis discusses about designs and develops techniques and algorithms for performing web access control. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    A security payment model for financial payment using mykad by Ahmad Zahari, Nurul Huda

    Published 2011
    “…However, to make this payment model accepted by the public, the focus should be made on two issues; trust/security issue and performance issue. A system with security technique named Arbitrary Random Security Algorithm (ARSA) and a one-to-one multithreading model need to be developed in order to accelerate the authentication response time of MPM. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    NFC secured online transaction in mobile computing business by Mantoro, Teddy, Ayu, Media Anugerah, Brotosaputro, Gunawan, Ain, Nur F., Ghazali, Noorzalina

    Published 2012
    “…As for the security measurement, MD5 algorithm is implemented to process the system authorization. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Secured mobile transaction using NFC Technology: Top-Up printing system by Ayu, Media Anugerah, Mantoro, Teddy, Brotosaputro, Gunawan, Ain, Nur F., Ghazali, Noorzalina

    Published 2011
    “…As for the security measurement, MD5 algorithm is implemented to accept the system authorization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Novel Architecture for Transactive Energy Management Systems with Various Market Clearing Strategies by Arun, S.L., Bingi, K., Vijaya Priya, R., Jacob Raglend, I., Hanumantha Rao, B.

    Published 2023
    “…Further, an optimal load scheduling algorithm is developed at the end-users' premises to improve the profits in the LEM. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12
  13. 13

    Blockchain-enabled cybersecurity framework for healthcare domain by Islam, Md Shohidul

    Published 2025
    “…It also formulates the algorithms for the development of the proposed blockchain-enabled healthcare framework and evaluates its performance in data transaction management through simulation. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Managing Heterogeneous Database Replication Using Persistence Layer Synchronous Replication (PLSR) by Noraziah, Ahmad, Abdalla, Ahmed N., Beg, Abul Hashem

    Published 2013
    “…The main objective of this algorithm is to develop an adaptive persistence layer which consisted of reliable and smooth replication. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Energy efficiency of the bitcoin mining hardware and related blockchain technology by Noor Faiqah Izzati, Afandi

    Published 2018
    “…Developers of bitcoin hardware systems and bitcoin miners are the possible users of proposed formula and algorithm.…”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17

    Using a priori algorithm for supporting e-commerce system by Ahmad Sharif, Mohammad Nazir, Bahari, Mahadi, Bakri, Aryati, Zakaria, Nor Hidayati

    Published 2005
    “…This paper demonstrates the development of e-commerce system by focusing on the use of a Priori algorithm as supported feature in our e-commerce system. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Using a priori algorithm for supporting an e-commerce system by Ahmad Sharif, Mohammad Nazir, Ng, Moon Ching, Bakri, Aryati, Zakaria, Nor Hidayati

    Published 2005
    “…This paper demonstrates the development of e-commerce system by focusing on the use of a Priori algorithm as supported feature in our e-commerce system. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20