Search Results - (( development methodology encryption algorithm ) OR ( java adaptation optimization algorithm ))
Search alternatives:
- adaptation optimization »
- java adaptation »
-
1
Serpent encryption algorithm implementation on Compute Unified Device Architecture (CUDA)
Published 2010“…We present a methodology for the transformation of CPU-based implementation of Serpent encryption algorithm (in C language) on CUDA to take advantage of CUDA’s parallel processing capability. …”
Get full text
Get full text
Conference or Workshop Item -
2
Serpent encryption algorithm implementation on Compute Unified Device Architecture (CUDA)
Published 2010“…We present a methodology for the transformation of CPU-based implementation of Serpent encryption algorithm (in C language) on CUDA to take advantage of CUDA’s parallel processing capability. …”
Get full text
Get full text
Conference or Workshop Item -
3
Audio encryption and decryption using 3D AES block cipher algorithm / Nur Fattin Nadhrah Saifuddin
Published 2018“…This project purpose is to identify the implementation testing security using 3D AES block cipher algorithm. Besides, this encryption using audio as a data in order to design and develop the project. …”
Get full text
Get full text
Thesis -
4
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…Lastly the project has the objective to deploy and a grid computing facility that will beuse as a test bed for RSA algorithm Methodology used for the development is Rapid Application Development (RAD) as it will allow for fast development with a series of testing and prototyping. …”
Get full text
Get full text
Final Year Project -
5
CleverSecure ONLINE System
Published 2008“…The email system used to send the encrypted file to the third party. During the development of COS, the specific methodology used which is Prototyping Process. …”
Get full text
Get full text
Final Year Project -
6
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
7
Reconstructing applicable chaotic Baptista-type symmetric cryptosystem
Published 2014“…This recommended encryption algorithm also overcomes the flaw in Ariffin’s encryption procedure. …”
Get full text
Get full text
Get full text
Thesis -
8
Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis
Published 2024“…Firstly, they examined each algorithm of the RSA variants and analysed them according to the proposed methodology. …”
Get full text
Get full text
Get full text
Article -
9
Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis
Published 2024“…Firstly, they examined each algorithm of the RSA variants and analysed them according to the proposed methodology. …”
Get full text
Get full text
Get full text
Article -
10
Advanced Encryption Standard Mobile Application to Improve College Entrance Security in UNIMAS
Published 2022“…This proposed system is an Android-based application developed using the Waterfall methodology. This application also tracks the entrance and leave time of the visitors. …”
Get full text
Get full text
Get full text
Proceeding -
11
Advanced Encryption Standard Mobile Application to Improve College Entrance Security in UNIMAS
Published 2022“…This proposed system is an Android-based application developed using the Waterfall methodology. This application also tracks the entrance and leave time of the visitors. …”
Get full text
Get full text
Get full text
Article -
12
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. …”
Get full text
Get full text
Get full text
Thesis -
13
A platform to develop a secure instant messaging using jabber protocol
Published 2010Get full text
Article -
14
Fusion of license plate and face recognition for secure parking / Siti Salwa Md Noor
Published 2013“…The methodology proposed is based on algorithms tested for feature extraction of plate and face recognition based on unconstrained minimum average correlation energy (UMACE) filter. …”
Get full text
Get full text
Thesis -
15
Proposed method for enhancing quantum bit error rate using quantum key distribution technique
Published 2014“…This paper is proposed to provide a way for solving the key transmission issues using qkd, as a new method, by providing two quantum channels to improve qber. In addition also to develop an algorithm for integrating pki and qkd in solving the secrete key sharing issues in grid environment. …”
Get full text
Get full text
Conference or Workshop Item -
16
Cyber vulnerabilities in smart grid and safety measures for energy meters in advanced metering system and smart meter communications
Published 2023“…Besides, to ensure security of the network communication, a solution has been proposed using Elliptic Curve Cryptography (ECC) in combination with Salsa20 stream cipher algorithm. Comprehensive mathematical simulations have been conducted for both methodologies to examine their effectiveness in the real world, and to analyze whether they are efficient in terms of time and processing power. …”
Article -
17
Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim
Published 2022“…HIDUP is different from any current image steganography system available in the market as it implements two different encryption algorithms, which are Libsodium and Bcrypt, to provide more security. …”
Get full text
Get full text
Get full text
Book Section -
18
Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim
Published 2022“…HIDUP is different from any current image steganography system available in the market as it implements two different encryption algorithms, which are Libsodium and Bcrypt, to provide more security. …”
Get full text
Get full text
Get full text
Book Section -
19
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
Get full text
Get full text
Get full text
Get full text
Thesis
