Search Results - (( evaluate information encryption algorithm ) OR ( java implementation using algorithm ))
Search alternatives:
- information encryption »
- evaluate information »
- implementation using »
- java implementation »
- using algorithm »
-
1
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…Furthermore, the proposed scheme's performance and complexity are evaluated using the JPBC cryptographic library. The proposed schemes have been validated using informal and formal security verification to compare the achieved security features against various attacks. …”
Get full text
Get full text
Thesis -
3
The Performance of the 3DES and Fernet Encryption in Securing Data Files
Published 2024journal::journal article -
4
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…A series of simulations were conducted using MATLAB to evaluate the performance of the proposed chaotic-based encryption algorithm for FTP through different analyses covering key sensitivity, histogram, correlations, differential, information entropy, and encryption/decryption speed. …”
Get full text
Get full text
Get full text
Article -
5
-
6
CleverSecure ONLINE System
Published 2008“…This application also can encrypt the folder that contains the private information such as business plan etc. …”
Get full text
Get full text
Final Year Project -
7
The performance of the 3DES and Fernet encryption in securing data files
Published 2024Get full text
Article -
8
Secure mobile AES encryptor (SMAE)
Published 2016“…The reason the AES encryption algorithm selected is because it is considered as one of the most secure encryption algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
9
Audio encryption and decryption using 3D AES block cipher algorithm / Nur Fattin Nadhrah Saifuddin
Published 2018“…In other and, ADDIE model is a methodology that including analysis, design, development, implementation and evaluation that complete the cycle of the project that starts from get the title of project, survey and collect the information about encryption and decryption, and specify the scope to 3D AES block cipher algorithm.…”
Get full text
Get full text
Thesis -
10
Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map
Published 2023“…Results showed that the algorithm was able to securely protect image data and the private information associated with them, while also making it very difficult for unauthorized users to decrypt the information. …”
Get full text
Get full text
Get full text
Article -
11
A DNA-dynamic permutation-diffusion algorithm for image encryption using scaling chaotification models and advanced DNA operations
Published 2025“…To evaluate the proposed algorithm, extensive experiments have been conducted, and results have been compared with the latest encryption algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
-
13
-
14
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
15
Analysis of parabolic antennas for radio telescopes and the development of encryption methods for radio astronomical images
Published 2022“…The proposed algorithms include Development of Bit level Scrambling Encryption for Radio Telescope Imageries, Bit-levels Encryption for RGB Telescope Images, Bit-levels Encryption for RGB Telescope Images, Design of Encryption Algorithm in Combined Spatial and Frequency Domains for Telescope Grayscale and Bayer Images, and Combined Spatial and Frequency Domains in Algorithm of RGB Color Image Security for Telescope Images. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Security in robot operating system (ROS) by using Advanced Encryption Standard (AES)
Published 2018“…In particular, this research focuses on using encryption algorithm which is AES. The encryption algorithm will be evaluated according to the performance of the system, both from computing and communications point of view.…”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
17
An enhanced fingerprint template protection scheme
Published 2022“…Furthermore, an improved chaos-based encryption algorithm was proposed for encrypting FT. …”
Get full text
Get full text
Thesis -
18
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
19
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
20
Designing New Block Cipher Based On Genetic Algorithm Approach
Published 2024“…In this research also, the algorithm has been tested with NIST Statistical Test suite to evaluate the randomness of the output. …”
Article
