Search Results - (( messaging application system algorithm ) OR ( java application using algorithm ))
Search alternatives:
- messaging application »
- system algorithm »
- java application »
- using algorithm »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016“…Diffie-Hellman algorithm is used to determine the pixel on an image that will be used to store the message. …”
Get full text
Get full text
Conference or Workshop Item -
2
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…Advanced Encryption Standard algorithm is being used to encrypt the text messaging. …”
Get full text
Get full text
Student Project -
3
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…SANAsms or Short Messaging System (SMS) Encryption System is as application on mobile phone that enables to send, receive and store encrypted text messages. …”
Get full text
Get full text
Conference or Workshop Item -
4
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The project objectives includes:(i) To investigate lightweight message encryption algorithms by benchmarking their efficiency in terms of computation speed and generated cipher text size; (ii) To design and develop the TalkOut mobile application with lightweight message encryption by using prototype software development model.; and (iii) To evaluate the usability performance of the developed proposed TalkOut mobile application using System Usability Scale (SUS) approach. …”
Get full text
Get full text
Get full text
Academic Exercise -
5
Text messaging encryption system
Published 2012Get full text
Get full text
Undergraduates Project Papers -
6
Text steganalysis using evolution algorithm approach
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
7
-
8
Network monopoly / Tan Kean Yeap
Published 2002“…The possible applications of multimedia-networked system are endless, as the demand to supoort interactive communication among groups of users has increased significantly. …”
Get full text
Get full text
Thesis -
9
Text spam messages classification using Artificial Immune System (AIS) algorithms
Published 2024thesis::master thesis -
10
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
11
New approach of cryptography algorithm for e- mail applications
Published 2005“…The main steps in this algorithm started with reading the plain text "Original Message" from the user. …”
Get full text
Get full text
Conference or Workshop Item -
12
A non-blocking coordinated checkpointing algorithm for message-passing systems
Published 2015Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
14
Web-Application for securing message using Steganography with LSB Algorithm and Hybrid Encryption / Muhammad Khairul Amin Mohd Nai and Siti Rahayu Abdul Aziz
Published 2021“…Web-Application for Securing Message using Steganography with LSB Algorithm and Hybrid Encryption is a web application that encrypt the messages user input and hide it in an image file to give an utmost security for the messages to be delivered and received. …”
Get full text
Get full text
Get full text
Book Section -
15
Web-Application for securing message using Steganography with LSB Algorithm and Hybrid Encryption / Muhammad Khairul Amin Mohd Nai and Siti Rahayu Abdul Aziz
Published 2021“…Web-Application for Securing Message using Steganography with LSB Algorithm and Hybrid Encryption is a web application that encrypt the messages user input and hide it in an image file to give an utmost security for the messages to be delivered and received. …”
Get full text
Get full text
Get full text
Book Section -
16
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
17
-
18
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
19
Statistical selection algorithm for peer-to-peer system
Published 2008Get full text
Get full text
Get full text
Article -
20
Steganography algorithm to hide secret message inside an image
Published 2011Get full text
Get full text
Article
