Search Results - (( developing web encryption algorithm ) OR ( java subset selection algorithm ))
Search alternatives:
- selection algorithm »
- subset selection »
- developing web »
- web encryption »
- java »
-
1
Secure mobile AES encryptor (SMAE)
Published 2016“…The purpose of this project is to identify a way to develop a mobile web application for the encryption and decryption of files using the 256 –bit Advanced Encryption Standard (AES) encryption algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
2
Web-Application for securing message using Steganography with LSB Algorithm and Hybrid Encryption / Muhammad Khairul Amin Mohd Nai and Siti Rahayu Abdul Aziz
Published 2021“…Web-Application for Securing Message using Steganography with LSB Algorithm and Hybrid Encryption is a web application that encrypt the messages user input and hide it in an image file to give an utmost security for the messages to be delivered and received. …”
Get full text
Get full text
Get full text
Book Section -
3
Web-Application for securing message using Steganography with LSB Algorithm and Hybrid Encryption / Muhammad Khairul Amin Mohd Nai and Siti Rahayu Abdul Aziz
Published 2021“…Web-Application for Securing Message using Steganography with LSB Algorithm and Hybrid Encryption is a web application that encrypt the messages user input and hide it in an image file to give an utmost security for the messages to be delivered and received. …”
Get full text
Get full text
Get full text
Book Section -
4
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
Get full text
Get full text
Thesis -
5
Database encryption for a Web-based Claims System
Published 2008“…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
Get full text
Thesis -
6
-
7
Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri
Published 2021“…The main for this techniques which was encryption and decryption were introduced and developed to provide security to these applications. …”
Get full text
Get full text
Student Project -
8
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
9
Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik
Published 2003“…Research on website and server security currently have been developing Web Document Integrity Detector (WebDID) to overcome intrusion in website and web server. …”
Get full text
Get full text
Monograph -
10
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
11
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
Get full text
Get full text
Get full text
Thesis -
12
Development of scalable video compression algorithm
Published 2011Get full text
Get full text
Get full text
Book Chapter -
13
-
14
Design and implementation of a private and public key crypto processor for next-generation it security applications
Published 2006“…This paper presents the design and implementation of a crypto processor, a special-purpose embedded system optimized for the execution of cryptographic algorithms in hardware. This cryptosystem can be used in wide range of electronic devices, which include PCs, PDAs, wireless handsets, smart cards, hardware security modules, network appliances, such as routers, gateways, firewalls, storage and web servers. …”
Get full text
Get full text
Get full text
Article
