Search Results - (( java implementation developing algorithm ) OR ( technology implementing encryption algorithm ))
Search alternatives:
- implementation developing »
- technology implementing »
- implementing encryption »
- java implementation »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
2
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
3
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
4
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
5
Secure E-Voting With Blind Signature
Published 2003“…In this system, voter’s privacy is guaranteed by using a blind signature for confidentiality and voter’s digital signature for voter’s authentication. E-Voting is implemented by employing Java socket technology and BouncyCastle cryptography provider. …”
Get full text
Get full text
Conference or Workshop Item -
6
-
7
-
8
Implementation of a parallel XTS encryption mode of operation
Published 2014Get full text
Get full text
Get full text
Article -
9
Design and implementation of advanced encryption standard using verilog HDL
Published 2022“…The focus of this paper is to match with the existing cryptography algorithm, 128-bit Advanced Encryption Algorithm and improving the processing speed for the design with hardware implementation. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004Get full text
Get full text
Thesis -
11
Performance comparison encryption of IPSEC VPN encryption techniques / Nur Hasyimah Mohd Ridzuan
Published 2015“…By varying the combination of encryption algorithm 3DES and AES 256 with two hashing type SHA-1 and MD5, the performance of each algorithm was compared and analyzed via Window 7 environment. …”
Get full text
Get full text
Thesis -
12
Performance comparison of encryption IPsec VPN encryption techniques / Nur Hasyimah Mohd Ridzuan and Ruhani Ab Rahman
“…By varying the combination of encryption algorithm 3DES and AES 256 with two hashing type SHA-1 and MD5, the performance of each algorithm was compared and analyzed via Window 7 environment. …”
Get full text
Get full text
Article -
13
Design and Implementation of Advanced Encryption Standard Using Verilog HDL
Published 2020“…The focus of this paper is to match with the existing cryptography algorithm, 128-bit Advanced Encryption Algorithm and improving the processing speed for the design with hardware implementation. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
The Performance of the 3DES and Fernet Encryption in Securing Data Files
Published 2024journal::journal article -
15
-
16
-
17
Encryption Technology on Windows Workstation
Published 2004“…The result of this study will be an enhanced version of current encryption technology that is ready to be implemented or applied by interested parties.…”
Get full text
Get full text
Final Year Project -
18
Cryptography: A New Approach of Classical Hill Cipher
Published 2013Get full text
Get full text
Article -
19
The performance of the 3DES and Fernet encryption in securing data files
Published 2024Get full text
Article -
20
Enhancing selective encryption for H.264/AVC using advanced encryption standard
Published 2010“…In this paper proposed a new system of video encryption is presented. The proposed system aim to gain a deep understanding of video data security on multimedia technologies, to investigate how encryption and decryption could be implemented for real time video applications, and to enhance the selective encryption for H.264/AVC. …”
Get full text
Get full text
Get full text
Article
