Search Results - (( messaging application a algorithm ) OR ( java application using algorithm ))
Search alternatives:
- messaging application »
- java application »
- using algorithm »
- application a »
- a algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The receiver of the encrypted text uses a "key" to decrypt the message, returning it to its original plain text form. …”
Get full text
Get full text
Final Year Project -
2
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…Advanced Encryption Standard algorithm is being used to encrypt the text messaging. …”
Get full text
Get full text
Student Project -
3
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item -
4
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…Users are able to exchange sensitive messages using SMS because the message is in an encrypted and a protected form, which it is hard for the attacker or non-authorize person to read the messages. …”
Get full text
Get full text
Conference or Workshop Item -
5
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…However, the increased security breaches of recent mental health applications that leaked the patient's profile. This project proposed a virtual mental health mobile application, called TalkOut, with a lightweight message encryption algorithm to protect patient's profile, conversation messages and treatment history. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
7
Text messaging encryption system
Published 2012Get full text
Get full text
Undergraduates Project Papers -
8
-
9
Text steganalysis using evolution algorithm approach
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
Network monopoly / Tan Kean Yeap
Published 2002“…With the powerful networking features of Java, it is expected that this project would produce a "real" game engine. …”
Get full text
Get full text
Thesis -
13
-
14
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
15
Text spam messages classification using Artificial Immune System (AIS) algorithms
Published 2024thesis::master thesis -
16
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…The purpose of this thesis is to introduce and demonstrate a new algorithm for Internet and e-mail security. …”
Get full text
Get full text
Thesis -
17
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
18
New approach of cryptography algorithm for e- mail applications
Published 2005“…The main steps in this algorithm started with reading the plain text "Original Message" from the user. …”
Get full text
Get full text
Conference or Workshop Item -
19
A taxonomy for congestion control algorithms in vehicular ad hoc networks
Published 2012“…On the other hand, to guarantee the reliability and timely delivery of event-driven messages, having a congestion free control channel is a necessity. …”
Get full text
Get full text
Conference or Workshop Item -
20
Fast ZeroY algorithm for efficient message routing in optical multistage interconnection networks
Published 2008Get full text
Get full text
Conference or Workshop Item
