Search Results - (( java application customization algorithm ) OR ( using com encryption algorithm ))
Search alternatives:
- customization algorithm »
- java application »
- using com »
-
1
Mobile application design for protecting the data in cloud using enhanced technique of encryption
Published 2024journal::journal article -
2
-
3
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
4
The Performance of the 3DES and Fernet Encryption in Securing Data Files
Published 2024journal::journal article -
5
-
6
-
7
-
8
A hybrid method for data communication using encrypted audio steganography
Published 2024journal::journal article -
9
Cyber Threat Extenuation for Substation Data Communication: Evaluation of Encrypt-Authenticator Prototype for IEC 60870-5 Data
Published 2023Conference Paper -
10
-
11
-
12
-
13
-
14
A performance improvement of Domosi’s cryptosystem
Published 2015Get full text
Get full text
Get full text
Proceeding Paper -
15
-
16
Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm
Published 2024journal::journal article -
17
A chaotic neural network based encryption algorithm for MPEG-2 encoded video signal
Published 2012Get full text
Working Paper -
18
Chaos-based simultaneous compression and encryption for Hadoop
Published 2017Get full text
Get full text
Article -
19
-
20
