Search Results - (( java implementation phase algorithm ) OR ( knowledge creating encryption algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    Ciphercrypt-an Encryption System / Nor Hidayah Ngah by Nor Hidayah, Ngah

    Published 2004
    “…There arc 3 types of encryption algorithm provided which are 3-DES , RC 4 and RC2. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Cryptanalysis in cryptographic algorithm design by Z'aba, Muhammad Reza, Ahmad, Badrisham, Ibrahim, Subariah, Maarof, Mohd. Aizaini

    Published 2006
    “…Cryptanalysis deals with the uncovering of encrypted messages without initial knowledge of the key used in the encryption process. …”
    Get full text
    Conference or Workshop Item
  3. 3

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…Diffie–Hellman key exchange method allows two people that have no previous knowledge of each other to jointly create a shared secret key over an insecure channel. …”
    Get full text
    Get full text
    Student Project
  5. 5
  6. 6
  7. 7

    Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar by Tengku Jaafar, Tengku Salman Fathi

    Published 2006
    “…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim by Razali, Azli Amirul Ehsan, Halim, Faiqah Hafidzah

    Published 2022
    “…HIDUP is different from any current image steganography system available in the market as it implements two different encryption algorithms, which are Libsodium and Bcrypt, to provide more security. …”
    Get full text
    Get full text
    Get full text
    Book Section
  9. 9

    Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim by Razali, Azli Amirul Ehsan, Halim, Faiqah Hafidzah

    Published 2022
    “…HIDUP is different from any current image steganography system available in the market as it implements two different encryption algorithms, which are Libsodium and Bcrypt, to provide more security. …”
    Get full text
    Get full text
    Get full text
    Book Section
  10. 10

    The Rise of Blockchain Internet of Things (BIoT): Secured, Device-to-Device Architecture and Simulation Scenarios by Arun Rana, Sharad Sharma, Kashif Nisar, Ag. Asri Ag. Ibrahim, Sachin Dhawan, Bhawani Chowdhry, Samreen Hussain, Nitin Goyal

    Published 2022
    “…In addition, the huge volume of data generated by IoT devices remains an open challenge for existing platforms to process, analyze, and discover underlying trends to create a convenient environment. As a result, to deliver acceptable services, a new solution is necessary to secure data accountability, increase data privacy and accessibility, and extract hidden patterns and usable knowledge. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article