Search Results - (( knowledge information encryption algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- information encryption »
- optimisation algorithm »
- knowledge information »
- java application »
-
1
Cryptanalysis in cryptographic algorithm design
Published 2006“…Cryptanalysis deals with the uncovering of encrypted messages without initial knowledge of the key used in the encryption process. …”
Get full text
Conference or Workshop Item -
2
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
Get full text
Get full text
Conference or Workshop Item -
3
-
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
5
Second Level Password Generator
Published 2010“…The two algorithms chosen to develop this system are Advanced Encryption Standard (AES) and Data Encryption Standard (DES). …”
Get full text
Get full text
Conference or Workshop Item -
6
Sharp-Edges Steganography in Arabic Characters for Information Hiding
Published 2011Get full text
Get full text
Thesis -
7
Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim
Published 2022“…The Requirement Gathering and Analysis Phase ensures that all information is gathered to gain knowledge from all potential users of the system. …”
Get full text
Get full text
Get full text
Book Section -
8
Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim
Published 2022“…The Requirement Gathering and Analysis Phase ensures that all information is gathered to gain knowledge from all potential users of the system. …”
Get full text
Get full text
Get full text
Book Section -
9
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
10
A novel framework for secure cryptocurrency transactions using quantum crypto guard
Published 2025“…It uses sharding, a Proof-of-Stake (PoS) consensus method, and a threshold signature scheme (TSS) to make the system more scalable and use less energy. Zero-knowledge proofs (ZKPs) are used to check transactions without giving out private information. …”
Get full text
Get full text
Get full text
Get full text
Article
