Search Results - (( java application server algorithm ) OR ( using linear block algorithm ))
Search alternatives:
- application server »
- java application »
- server algorithm »
- block algorithm »
-
1
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…The design of the s-box is the most crucial part while designing a new block cipher algorithm since it is the only non-linear element of the cipher. …”
Get full text
Get full text
Thesis -
2
A block cipher based on genetic algorithm
Published 2016“…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
Get full text
Get full text
Get full text
Thesis -
3
Efficient dynamic DNA-based block cipher algorithm
Published 2023“…The significance of block cipher algorithms lies in their versatility and resilience. …”
Get full text
Get full text
Thesis -
4
Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming
Published 2019“…Block cipher algorithms become an essential domain in Information Technology (IT) due to ever increasing the number of attacks. …”
Get full text
Get full text
Get full text
Article -
5
Network game (Literati) / Chung Mei Kuen
Published 2003“…Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
Get full text
Get full text
Thesis -
6
Secure block cipher inspired by the human immune system
Published 2012“…It also measures the diffusion property in linear transformation using branch number in estimating the possible success of differential and linear attacks. …”
Get full text
Get full text
Thesis -
7
Dynamic S-boxes and spiral permutation function on Fibonacci sequence for secure block cipher / Kamsiah Mohamed
Published 2022“…In conclusion, this proposed block cipher can also be used as a secure algorithm by nations, organisations or stakeholders to improve data protection besides contributing to computer security research as an alternative to other cryptographic algorithms. …”
Get full text
Get full text
Thesis -
8
Approximating Non Linear Higher Order ODEs By A Three Point Block Algorithm
Published 2024journal::journal article -
9
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…After that, critical performance measurements and metrics used in 3D–CA are identified. The module of a KD-3DCA block cipher is designed and algorithms of the new KD-3D-CA block cipher are generated. …”
Get full text
Get full text
Thesis -
10
-
11
Codebook excited linear predictive coding
Published 2011“…In standard Codebook Exited Linear Coding (CELP) the encoding method uses random values for excitation vectors. …”
Get full text
Get full text
Get full text
Book Chapter -
12
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
13
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
14
A study on the VLSI partitions: the implementation of Fiduccia-Mattheyses algorithm / Burhanuddin Omar
Published 1997“…To deal with cells of various size , the algorithm progresses by moving one cell at a time between the blocks of the partition while maintaining a desired based on the size of the blocks rather than the number of cells per block. …”
Get full text
Get full text
Thesis -
15
Security analysis of blowfish algorithm
Published 2013“…Blowfish algorithm (BA) is a symmetric block cipher with a 64-bit block size and variable key lengths from 32 bits up to a maximum of 448 bits. …”
Get full text
Get full text
Conference or Workshop Item -
16
Audio encryption and decryption using 3D AES block cipher algorithm / Nur Fattin Nadhrah Saifuddin
Published 2018“…This project purpose is to identify the implementation testing security using 3D AES block cipher algorithm. Besides, this encryption using audio as a data in order to design and develop the project. …”
Get full text
Get full text
Thesis -
17
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
18
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
19
-
20
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…On the basis of the results of this research, it can be concluded that the developed prototype had high accuracy and security when transferring the file between the sender and receiver that was implemented in client-server application. This research hopes to give a clear idea to the readers about ABS algorithm. …”
Get full text
Get full text
Undergraduates Project Papers
