Search Results - (( java implication force algorithm ) OR ( java technology utilization algorithm ))*
Search alternatives:
- technology utilization »
- utilization algorithm »
- implication force »
- java implication »
- force algorithm »
- java technology »
-
1
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…The two most famous techniques for data security are steganography and cryptography. Utilization of a solitary algorithm is not powerful for extra ordinary state security to information in cloud computing. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
-
4
Biometrics electronic purse
Published 1999“…A proto-type of the proposed Biometrics Electronic Purse (BEP) was build using the Schlumberger Cyberflex Multi8K Java Card with a simple File Management Utilities software to upload download biometrics template to/&om the Java Card.…”
Get full text
Get full text
Get full text
Proceeding Paper -
5
Automatic generation of content security policy to mitigate cross site scripting
Published 2016Get full text
Get full text
Conference or Workshop Item -
6
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. This application can be installing into the mobile phone.…”
Get full text
Get full text
Thesis -
7
Evolutionary Music; Composing Beats and Chords Progression
Published 2020Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
-
9
-
10
-
11
-
12
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
Get full text
Get full text
Thesis
