Search Results - (( knowledge information encryption algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- information encryption »
- knowledge information »
- java application »
-
1
Cryptanalysis in cryptographic algorithm design
Published 2006“…Cryptanalysis deals with the uncovering of encrypted messages without initial knowledge of the key used in the encryption process. …”
Get full text
Conference or Workshop Item -
2
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
Get full text
Get full text
Conference or Workshop Item -
3
-
4
Second Level Password Generator
Published 2010“…The two algorithms chosen to develop this system are Advanced Encryption Standard (AES) and Data Encryption Standard (DES). …”
Get full text
Get full text
Conference or Workshop Item -
5
Sharp-Edges Steganography in Arabic Characters for Information Hiding
Published 2011Get full text
Get full text
Thesis -
6
Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim
Published 2022“…The Requirement Gathering and Analysis Phase ensures that all information is gathered to gain knowledge from all potential users of the system. …”
Get full text
Get full text
Get full text
Book Section -
7
Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim
Published 2022“…The Requirement Gathering and Analysis Phase ensures that all information is gathered to gain knowledge from all potential users of the system. …”
Get full text
Get full text
Get full text
Book Section -
8
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
9
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
A novel framework for secure cryptocurrency transactions using quantum crypto guard
Published 2025“…It uses sharding, a Proof-of-Stake (PoS) consensus method, and a threshold signature scheme (TSS) to make the system more scalable and use less energy. Zero-knowledge proofs (ZKPs) are used to check transactions without giving out private information. …”
Get full text
Get full text
Get full text
Get full text
Article
