Search Results - (( java implementation based algorithm ) OR ( based information encryption algorithm ))
Search alternatives:
- information encryption »
- implementation based »
- java implementation »
- based information »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
3
-
4
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
5
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The evaluation of the security of the proposed scheme is based on SVO logic to verify the security of the informal method. …”
Get full text
Get full text
Thesis -
6
An enhanced color image encryption algorithm using LT-PRNG
Published 2018“…In this study, a hybrid chaotic map based on logistic map and tent map is proposed for generating a random sequence for enhancing the encryption performance of image encryption algorithms. …”
Get full text
Get full text
Thesis -
7
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
Get full text
Get full text
Get full text
Article -
8
Research on the security algorithm of reversible information hiding in communication encrypted image
Published 2021“…Considering the embedding capacity and the security of the algorithm, the paper proposes a reversible information hiding algorithm for encrypted images based on. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
9
Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan
Published 2014“…El-gamal encryption system is an asymmetric key encryption algorithm which is based on the Diffie-Hellman key exchange. …”
Get full text
Get full text
Thesis -
10
An efficient secure ECG compression based on 2D-SPIHT and SIT algorithm
Published 2017Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
Published 2006Get full text
Get full text
Monograph -
12
Encrypted mobile messaging application using 3D-AES block cipher cryptography algorithm / Aida Najihah Mohd Khlubi
Published 2019“…Cryptography technique comprises encrypting and decrypting information which can only be seen by the sender and receiver. …”
Get full text
Get full text
Student Project -
13
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Advanced Encryption Standard (AES) was chosen as encryption algorithm and HMAC Standard Hash Algorithm 1 (SHA1) was chosen as HMAC algorithm. …”
Get full text
Get full text
Thesis -
14
-
15
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
16
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
Get full text
Get full text
Conference or Workshop Item -
17
Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari
Published 2014“…Based on the research that had been conducted, it shows that the enhanced algorithm have managed to speed up the computational process for encryption and decryption of the text in the Android platform to reduce computational overhead. …”
Get full text
Get full text
Thesis -
18
Secure mobile AES encryptor (SMAE)
Published 2016“…The reason the AES encryption algorithm selected is because it is considered as one of the most secure encryption algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
19
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…A key schedule algorithm is the mechanism that generates and schedules all session-keys for the encryption process. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
