Search Results - (( java information security algorithm ) OR ( program implementation phase algorithm ))
Search alternatives:
- program implementation »
- implementation phase »
- java information »
- phase algorithm »
-
1
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…The two most famous techniques for data security are steganography and cryptography. Utilization of a solitary algorithm is not powerful for extra ordinary state security to information in cloud computing. …”
Get full text
Get full text
Get full text
Thesis -
2
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…Therefore, SANAsms system ensures that information (SMS) interchange between sender and receiver is secured and protected because the messages containing delicate information are stored securely and remain undisclosed even when the device is accessed by an adversary. …”
Get full text
Get full text
Conference or Workshop Item -
3
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
4
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
5
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The significance is to protect personal information and provide future robust security on mobile messaging application. …”
Get full text
Get full text
Student Project -
6
Text messaging encryption system
Published 2012“…Text Messaging Encryption system is a text message encryption and decryption.Encryption is a process of masking a message so that it is unreadable.Encryption is important to avoid other people to read certain information. The only way to read the information is to know the method on how message is being masked,in this case knowing the algorithm used to encrypt the message. …”
Get full text
Get full text
Undergraduates Project Papers -
7
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
8
-
9
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. …”
Get full text
Get full text
Get full text
Article -
10
PIC-Based Controller for IGBT Inverter for 3-Phase Motor Drive
Published 2011“…This project covers the controller mechanism and algorithm for IGBT inverter in 3-phase motor implementation. …”
Get full text
Get full text
Final Year Project -
11
-
12
Automatic generation of content security policy to mitigate cross site scripting
Published 2016Get full text
Get full text
Conference or Workshop Item -
13
Implementation frequency translation by adapting digital phase shifter for WCDMA using XILINX
Published 2009Get full text
Get full text
Student Project -
14
Dam haji game using A* search algorithm / Siti Farah Najwa Mukhlis
Published 2017Get full text
Get full text
Thesis -
15
Three-probe reflectometer algorithm for calculation of complex reflection coefficient of liquids / Aidil Saifan Abu Bakar
Published 2003“…This paper describes a technique for measurement of complex reflection coefficient of liquids using slotted line (implemented in waveguide form). In order to make precision measurement of magnitude and phase of reflection coefficient, the Three-Probe Reflectometer Algorithm has been used (which was implemented on the personal computer using Visual Basic 6 programming). …”
Get full text
Get full text
Thesis -
16
Text steganalysis using evolution algorithm approach
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
17
-
18
-
19
DC-link capacitor voltage control for single-phase shunt active power filter with step size error cancellation in self-charging algorithm
Published 2016“…For hardware implementation, the proposed algorithm was programmed in TMS320F28335 digital signal processing board. …”
Get full text
Get full text
Get full text
Article -
20
CAR TRACTION CONTROL SYSTEM
Published 2007“…VHDL is used in FPGA - based implementation. The methodology includes designing the fuzzy logic controller, development of the algorithm and codes programming. …”
Get full text
Get full text
Final Year Project
