Search Results - (( knowledge creating encryption algorithm ) OR ( java adaptation optimization algorithm ))
Search alternatives:
- adaptation optimization »
- knowledge creating »
- java adaptation »
-
1
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…There arc 3 types of encryption algorithm provided which are 3-DES , RC 4 and RC2. …”
Get full text
Get full text
Thesis -
2
Cryptanalysis in cryptographic algorithm design
Published 2006“…Cryptanalysis deals with the uncovering of encrypted messages without initial knowledge of the key used in the encryption process. …”
Get full text
Conference or Workshop Item -
3
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
4
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…Diffie–Hellman key exchange method allows two people that have no previous knowledge of each other to jointly create a shared secret key over an insecure channel. …”
Get full text
Get full text
Student Project -
5
-
6
Sharp-Edges Steganography in Arabic Characters for Information Hiding
Published 2011Get full text
Get full text
Thesis -
7
Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim
Published 2022“…HIDUP is different from any current image steganography system available in the market as it implements two different encryption algorithms, which are Libsodium and Bcrypt, to provide more security. …”
Get full text
Get full text
Get full text
Book Section -
8
Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim
Published 2022“…HIDUP is different from any current image steganography system available in the market as it implements two different encryption algorithms, which are Libsodium and Bcrypt, to provide more security. …”
Get full text
Get full text
Get full text
Book Section -
9
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
The Rise of Blockchain Internet of Things (BIoT): Secured, Device-to-Device Architecture and Simulation Scenarios
Published 2022“…In addition, the huge volume of data generated by IoT devices remains an open challenge for existing platforms to process, analyze, and discover underlying trends to create a convenient environment. As a result, to deliver acceptable services, a new solution is necessary to secure data accountability, increase data privacy and accessibility, and extract hidden patterns and usable knowledge. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article
