Search Results - (( development under encryption algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1
  2. 2
  3. 3

    Security in robot operating system (ROS) by using Advanced Encryption Standard (AES) by Nor Alia Syuhada, Shaharudin

    Published 2018
    “…The study investigates a robot’s performance when ciphering the messages interchanged between ROS nodes under the publish/subscribe paradigm. In particular, this research focuses on using encryption algorithm which is AES. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4

    Conceptual framework for lightweight ciphertext policy-attribute based encryption scheme for internet of things devices / Norhidayah Muhammad and Jasni Mohamad Zain by Muhammad, Norhidayah, Mohamad Zain, Jasni

    Published 2019
    “…There are AES, PRESENT, Hash algorithm declared as a lightweight algorithm under consideration in ISO/IEC 29192 “Lightweight Cryptography”. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Design of an advanced encryption standard crypto-processor core for field programmable gate array implementation by Ismail, Mohd. Izuan

    Published 2006
    “…The processors perform their respective dedicated algorithm-intensive computations. This thesis presents the architecture for implementation of the new Advanced Encryption Standard (AES) in hardware for operating under SoC environment. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri ... [et al.] by Ahmad Zukri, Nurul Hidayah, Kamarudin, Nur Khairani, Izraf Ishak, Mohd Enif, Md Rashid, Nor Aimuni

    Published 2018
    “…Many different techniques have been developed under the cryptography umbrella. However, it is not enough to keep the contents of a message secret. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    An overview: Theoretical and mathematical perspectives for advance Encryption standard/Rijndael by Zaidan, A.A., Zaidan, B.B., Al-Frajat, Ali K., Jalab, Hamid Abdullah

    Published 2010
    “…This overview for advance encryption standard achieving a flexibility and uncomplicated handle with this algorithm, which is a challenge of researchers when be used as implementation. © 2010 Asian Network for Scientific Information.…”
    Get full text
    Get full text
    Article
  8. 8

    Feasibility of quantum cryptography with AES for secure communication by Mustaffa, Nurul Muzfirah, Mat Daud, Nurulain Balqis, Sase, Takumi

    Published 2026
    “…Traditional encryption techniques face serious threats from the rapid development of quantum computing, which could soon compromise many classical algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim by Kamaruddin, Nurul Azwa, Mustakim, Nurul Ain

    Published 2012
    “…The purpose of the qualitative study is to explore and develop basic understanding of the properties of the families of Edwards curves, one of the special forms of elliptic curves, and their applications in cryptography, using grounded theory approach, in which the data are hand-analyzed, coded and grouped into themes under study. …”
    Get full text
    Get full text
    Research Reports
  10. 10

    Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure by Asbullah, Muhammad Asyraf

    Published 2015
    “…As a consequence, we develop four cryptanalysis methods by which to show that N = p2q can be factored in polynomial time under certain conditions. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim by Razali, Azli Amirul Ehsan, Halim, Faiqah Hafidzah

    Published 2022
    “…HIDUP is different from any current image steganography system available in the market as it implements two different encryption algorithms, which are Libsodium and Bcrypt, to provide more security. …”
    Get full text
    Get full text
    Get full text
    Book Section
  12. 12

    Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim by Razali, Azli Amirul Ehsan, Halim, Faiqah Hafidzah

    Published 2022
    “…HIDUP is different from any current image steganography system available in the market as it implements two different encryption algorithms, which are Libsodium and Bcrypt, to provide more security. …”
    Get full text
    Get full text
    Get full text
    Book Section
  13. 13
  14. 14

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  15. 15

    SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems by Khalid, Haqi, Hashim, Shaiful Jahari, Syed Ahmad Abdul Rahman, Sharifah Mumtazah, Hashim, Fazirulhisyam, Chaudhary, Muhammad Akmal

    Published 2021
    “…The proposed scheme extends the Kerberos workflow and utilizes the AES-ECC algorithm for efficient encryption keys management and secure communication between the edge nodes and fog node servers to establish secure mutual authentication. …”
    Get full text
    Get full text
    Article
  16. 16

    Enhancement of Security Architecture for Smartcard Based Authentication Protocols by Mohammed, Lawan Ahmed

    Published 2004
    “…To identify the best cryptographic algorithm suitable for smartcard applications, the dissertation also investigates the implementation of Elliptic Curve encryption techniques and presents performance comparisons based on similar techniques. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item