Search Results - (( java implementation barriers algorithm ) OR ( programming variable encryption algorithm ))
Search alternatives:
- programming variable »
- java implementation »
- variable encryption »
- barriers algorithm »
-
1
OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA
Published 2004“…The aim of the competition was to find a suitable candidate to replace DES at the core of many encryption systems worldwide. Twofish can work with variable key lengths: 128, 192 or 256 bits. …”
Get full text
Get full text
Final Year Project -
2
Optimization Of Twofish Encryption Algorithm On FPGA
Published 2005“…The aim of the competition was to find a suitable candidate to replace DES at the core of many encryption systems worldwide. Twofish can work with variable key lengths: 128, 192 or 256 bits. …”
Get full text
Conference or Workshop Item -
3
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The obvious amount of lost money of victims has led to many court cases where victim and theft claims the ownership of the program and the winner is who has a good lawyer. Many programming languages are used for programming; Java programming language is known to be most common due to its features, the use of this popular language increases an attacker's ability to steal intellectual property (IP), as the source program is translated to an intermediate format retaining most of the information such as meaningful variables names present in source code. …”
Get full text
Get full text
Thesis -
4
Human activity recognition via accelerometer and gyro sensors
Published 2023“…Moreover, it reduces the barriers of entry for non-technical researchers to engage in HAR research. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…KSFaci is embedded in web environment and is implemented using Java Servlet and runs under Apache server. …”
Get full text
Get full text
Thesis
