Search Results - (( development perspective encryption algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 4 results of 4
Refine Results
  1. 1

    An overview: Theoretical and mathematical perspectives for advance Encryption standard/Rijndael by Zaidan, A.A., Zaidan, B.B., Al-Frajat, Ali K., Jalab, Hamid Abdullah

    Published 2010
    “…In this study a theoretical and mathematical perspectives for Advance Encryption Standard (AES)/Rijndael of multimedia encryption schemes have been proposed in the literature and description. …”
    Get full text
    Get full text
    Article
  2. 2

    Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil by Shahrul Kamil, Aiman Nurrasyid

    Published 2020
    “…The unauthorized modification of confidential data is one the main threats and is commonly addressed by cryptographic mechanisms, through encryption. However, in BLE 4.2 environment, encryption algorithms are only applied between BLE devices and gateway thus leaving the network to be vulnerable on the public side of the BLE network which is between the gateway and the server. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4