Search Results - (( java application system algorithm ) OR ( user interface encryption algorithm ))
Search alternatives:
- interface encryption »
- java application »
- system algorithm »
-
1
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
2
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…SANAsms or Short Messaging System (SMS) Encryption System is as application on mobile phone that enables to send, receive and store encrypted text messages. …”
Get full text
Get full text
Conference or Workshop Item -
3
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
4
Secure mobile AES encryptor (SMAE)
Published 2016“…The reason the AES encryption algorithm selected is because it is considered as one of the most secure encryption algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
5
CleverSecure ONLINE System
Published 2008“…CleverSecure Online System (COS) implements on the use of popular algorithm which is Blowfish algorithm to encrypt and decrypt the data that can be save in directory or send through email. …”
Get full text
Get full text
Final Year Project -
6
Embedded PC based wireless communication using XTEA
Published 2010“…It focuses mainly on cryptography and its implementation in an embedded system. The Extended Tiny Encryption Algorithm (XTEA) is the chosen encryption method. …”
Get full text
Get full text
Undergraduates Project Papers -
7
An enhanced fingerprint template protection scheme
Published 2022“…Furthermore, an improved chaos-based encryption algorithm was proposed for encrypting FT. …”
Get full text
Get full text
Thesis -
8
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007“…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
Get full text
Get full text
Conference or Workshop Item -
9
Improving security performance with parallel crypto operations in SSL bulk data transfer
Published 2009“…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
Get full text
Get full text
Get full text
Article -
10
A modification of Shamir's Three-Pass protocol by implementing one-time pad algorithm / Nur Khairunnisa' Kusman, Nurul Hanis Abd Rashid and An Nur Ameera Zamani
Published 2019“…The objectives of this study are to modified Shamir's three-pass protocol by implementing one¬ time pad protocol and to develop Graphical User Interface (GUI) by using Maple software. As a result, this study success to develop the algorithm by implemented one-time pad in Shamir's three-pass protocol. …”
Get full text
Get full text
Student Project -
11
-
12
A study of watermarking methods in medical application
Published 2004“…These three methods that being studied are better for integrity control. Meanwhile, a Graphic User Interface (GUI) is developed for embedding and extracting purpose. …”
Get full text
Get full text
Thesis -
13
Genetic algorithm for event scheduling system
Published 2010“…UTeM-EAS then is created by exploiting one of AI approach namely Genetic Algorithm (GA) with Crossover Technique. There are four main interfaces that ask for login information, add, edit and view events details. …”
Get full text
Get full text
Get full text
Article -
14
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
15
-
16
Collision probability of one-to-many reversible mapping for IPV6 address generation
Published 2012“…This IPv6 address is generated dynamically using CFB (Cipher Feedback)mode of AES (Advanced Encryption Standard) algorithm based on user identity. …”
Get full text
Get full text
Get full text
Proceeding Paper -
17
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
19
-
20
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item
