Search Results - (( java application reoptimize algorithm ) OR ( using negative encryption algorithm ))

  • Showing 1 - 4 results of 4
Refine Results
  1. 1

    Dynamic determinant matrix-based block cipher algorithm by Juremi, Julia

    Published 2018
    “…The performance analysis in terms of processing speed of the encryption and decryption process of the DDBC algorithm shows minimal differences in both AES and DDBC algorithm despite of the difference method of transformation used in both algorithms. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    A secure, anonymous and verifiable E-Voting system by Ooi, Elynn

    Published 2020
    “…Therefore, this paper studies the disadvantages of the existing voting system by looking through the method used by the society. Furthermore, this paper also proposes a more secure voting system which uses some encryption and hashing algorithms in order to solve the negative impacts of the existing voting systems. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    AN INTEGRATED TECHNIQUE IN ACHIEVING THE CONFIDENTIALITY, INTEGRITY AND ROBUSTNESS FOR BIG DATA TRANSMISSION by BHATTACHARJEE, SHILADITYA

    Published 2017
    “…Henceforth, this research addresses these security issues collectively without negatively affecting each other. It increases confidentiality and offers a backup for accidental data loss by combining Simplified Encryption Standard (SDES) and an advanced pattern generation technique which uses a unique pattern generation table. …”
    Get full text
    Get full text
    Thesis