Search Results - (( java implication based algorithm ) OR ( _ certification system algorithm ))

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…The system consist of a central database and organized into web page application which can be accessed by system admin, certificate user, and employer. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Secure file sharing with public key infrastructure (PKI) enablement / Noor Azlina Ismail @ Hassan by Ismail @ Hassan, Noor Azlina

    Published 2015
    “…The PKI is used to secure the exam question file during the preparation of exam question at Universiti Teknologi MARA, Jasin, Melaka. This system will used RSA and SHA-256 to produce digital signature because both of the algorithm consist more advantages than other algorithm which is suitable to used to protect document in current insecure network. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    Digital certificate-based authentication model for enhanced smartphone security / A. H. Azni, Sakiinah Altaf Hussain and Najwa Hayaati Mohd Alwi by Azni, A. H., Altaf Hussain, Sakiinah, Mohd Alwi, Najwa Hayaati

    Published 2025
    “…Aimed at addressing smartphone users' authentication needs, the model operates through three phases: Registration, Digital Certificate, and Authentication, each bolstering data protection through digital certificate-based authentication. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    An improved public key cryptography based on the elliptic curve by Al-Daoud, Essam Faleh

    Published 2002
    “…Meanwhile, the size of the public keys are reduced by 37 to 48 percent. The improved algorithms are applied to the on-line and off-line electronic payments systems, which lead to probably the best solution to reduce the objects size and enhance the performance in both systems.…”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad by Ahmad, Nurul Atirah

    Published 2023
    “…Thus, this project aims to classify and generate a list of potential job applicants by analyzing various attributes of their LinkedIn accounts, such as title, location, skills, education, language, certification, and experience. This project implements the Naive Bayes algorithm as the classification algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm by Nur Alya Afikah, Usop

    Published 2024
    “…A framework of enhanced authentication for PDF textual documents using Zigzag-lsb embedding algorithm is proposed in order to apply a new technique of watermarking scheme which can be used in general size of document, to study the current numbering of watermarking system to secure the authentication of digital documents, and evaluate the watermarking scheme for digital documents in terms of accuracy rate, and analyse the performance. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad, Khyrina Airin Fariza Abu Samah and Nuwairah Aimi Ahmad... by Ahmad, Nurul Atirah, Abu Samah, Khyrina Airin Fariza, Ahmad Kushairi, Nuwairah Aimi

    Published 2023
    “…Thus, this project aims to classify and generate a list of potential job applicants by analyzing various attributes of their LinkedIn accounts, such as title, location, skills, education, language, certification, and years of experience. This project implements the Naive Bayes algorithm as the classification algorithm. …”
    Get full text
    Get full text
    Book Section
  14. 14

    Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks by Atiewi S., Al-Rahayfeh A., Almiani M., Abuhussein A., Yussof S.

    Published 2025
    “…The registration contract is performed by a certificate authority, and the key is generated using the Enhanced Elliptic Curve Digital Signature (EECDS) algorithm which improves the secure and private communication between the users, IoT devices, and edge-gateway. …”
    Article
  15. 15
  16. 16

    Application Of The Blockchain Technology Within Healthcare by Lin, Michelle Hwei Yee

    Published 2021
    “…The idea of the EMR framework with the blockchain-based application and database system is developed. Patients, hospital providers, healthcare authorities, financial parties, and the Certificate Authority are among the five groups of participants involved in the proposed framework. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17
  18. 18

    Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing by Jamal, Fara

    Published 2021
    “…In particular, the Certificate Authority is a single entity that leads to a single point of failure, while the Attribute Authority works independently. …”
    Get full text
    Get full text
    Thesis