Search Results - (( developing world encryption algorithm ) OR ( java application optimization algorithm ))

Refine Results
  1. 1

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The aim of the thesis is to provide an overview of the ABS encryptiOn algorithm, to develop a prototype that is implemented for communication purpose, and to test the developed prototype in terms of accuracy purpose. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…This investigation takes the form of an IoT environment, beginning with an in-depth examination of the AAḃ encryption scheme design, and continuing into the development and real-world application of AAḃ from its mathematical origin. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar by Jaafar, Mohd Izhar

    Published 2012
    “…It have increase complexity of process encryption and decryption. New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri by Mohd Asri, Nuha Bakizah

    Published 2021
    “…The importance of data security in today’s world cannot be overemphasized. Numerous data security and hiding algorithms have been developed in the last decade. …”
    Get full text
    Get full text
    Student Project
  5. 5

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…The purpose of this thesis is to introduce and demonstrate a new algorithm for Internet and e-mail security. The proposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Design and Implementation of Advanced Encryption Standard Using Verilog HDL by Shamsiah, Suhaili, Rene Brooke, Fredrick, Zainah, Md. Zain, Norhuzaimin, Julai

    Published 2020
    “…The focus of this paper is to match with the existing cryptography algorithm, 128-bit Advanced Encryption Algorithm and improving the processing speed for the design with hardware implementation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Design and implementation of advanced encryption standard using verilog HDL by Shamsiah, Suhaili, Fredrick, Rene Brooke, Zainah, Md. Zain, Norhuzaimin, Julai

    Published 2022
    “…The focus of this paper is to match with the existing cryptography algorithm, 128-bit Advanced Encryption Algorithm and improving the processing speed for the design with hardware implementation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Doctor-patient remote consultation system with secure medical images by Teh, Yee Heng

    Published 2022
    “…In this rapid developing world, everything around us has becoming more and more digital related. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  10. 10
  11. 11

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM) by Shuwandy, Moceheb Lazam

    Published 2012
    “…Researchers were developed this method for the protection of this algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Design of an advanced encryption standard crypto-processor core for field programmable gate array implementation by Ismail, Mohd. Izuan

    Published 2006
    “…The processors perform their respective dedicated algorithm-intensive computations. This thesis presents the architecture for implementation of the new Advanced Encryption Standard (AES) in hardware for operating under SoC environment. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  15. 15
  16. 16

    Analysis of image steganography using AES / Nur Amira Muhamad Ghazali by Muhamad Ghazali, Nur Amira

    Published 2020
    “…In this project, we combine the method of cryptography and steganography using Advanced Encryption Standard (AES) and Least Significant Bits (LSB) algorithms. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19
  20. 20