Search Results - (( java application modified algorithm ) OR ( using negative encryption algorithm ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    Dynamic determinant matrix-based block cipher algorithm by Juremi, Julia

    Published 2018
    “…The performance analysis in terms of processing speed of the encryption and decryption process of the DDBC algorithm shows minimal differences in both AES and DDBC algorithm despite of the difference method of transformation used in both algorithms. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    A secure, anonymous and verifiable E-Voting system by Ooi, Elynn

    Published 2020
    “…Therefore, this paper studies the disadvantages of the existing voting system by looking through the method used by the society. Furthermore, this paper also proposes a more secure voting system which uses some encryption and hashing algorithms in order to solve the negative impacts of the existing voting systems. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    AN INTEGRATED TECHNIQUE IN ACHIEVING THE CONFIDENTIALITY, INTEGRITY AND ROBUSTNESS FOR BIG DATA TRANSMISSION by BHATTACHARJEE, SHILADITYA

    Published 2017
    “…Henceforth, this research addresses these security issues collectively without negatively affecting each other. It increases confidentiality and offers a backup for accidental data loss by combining Simplified Encryption Standard (SDES) and an advanced pattern generation technique which uses a unique pattern generation table. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  9. 9