Search Results - (( problem using encryption algorithm ) OR ( java application system algorithm ))
Search alternatives:
- java application »
- system algorithm »
-
1
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Text messaging encryption system
Published 2012“…Text Messaging Encryption system is a text message encryption and decryption.Encryption is a process of masking a message so that it is unreadable.Encryption is important to avoid other people to read certain information. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
4
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
5
Cryptography: A New Approach of Classical Hill Cipher
Published 2013“…Apart from this, the encryption quality of the proposed algorithm is also measured by using the maximum deviation and correlation coefficient factors. …”
Get full text
Get full text
Article -
6
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…These algorithms are being used as encryption algorithm in Encapsulated Security Payload (ESP) protocol. …”
Get full text
Get full text
Conference or Workshop Item -
7
-
8
A New Hybrid Image Encryption Technique Using Lorenz Chaotic System and Simulated Kalman Filter (SKF) Algorithm
Published 2022“…A new hybrid technique, Lorenz chaotic system and an optimization algorithm, Simulated Kalman Filter (SKF) had been proposed to solve image encryption problem. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Performance evaluation for different data encryption algorithms on wireless sensor network (WSN)
Published 2018“…Therefore, the aim of the project is to analyse and evaluate various different algorithms used image encryption in WSN. The algorithms considered are AES, SF and SIT algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
-
11
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
Published 2006“…However, until now, the cryptography hardware is still not commonly used especially in FPGA. In this project, the Blowfish encryption algorithm is chosen because it is among the safest algorithm used nowadays. …”
Get full text
Get full text
Monograph -
12
Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari
Published 2014“…However, AES users or application that using AES algorithm might face the problem of computational overhead. …”
Get full text
Get full text
Thesis -
13
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…Both old and new implementations are used to encrypt and decrypt different sizes and types of files using different generated key sizes. …”
Get full text
Get full text
Thesis -
14
A new image encryption algorithm based on single S-box and dynamic encryption step
Published 2021“…Secondly, a new dynamic encryption step method is proposed to solve the high correlation and deterministic problems in multiple S-box encryptions. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Experiment -
15
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Thus, it is suitable for mobile devices, it uses 160 bits key and provides the same security as RSA 1024 bits key.Some benefits are expected from this study to improve the encryption algorithm for mobile security.…”
Get full text
Get full text
Conference or Workshop Item -
16
A DNA-dynamic permutation-diffusion algorithm for image encryption using scaling chaotification models and advanced DNA operations
Published 2025“…To evaluate the proposed algorithm, extensive experiments have been conducted, and results have been compared with the latest encryption algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…Lastly, a new hybrid technique suggests tackling the current image encryption application problem by using the estimated parameters of chaotic systems with an optimization algorithm, the SKF algorithm. …”
Get full text
Get full text
Thesis -
18
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…ECC, AES, and RSA algorithms will be used to encrypt the files to enhance security data on the cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
19
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…This is useful for storing large amounts of data used in the cloud computing, the key distribution and authentication of the asymmetric encryption, speed, data integrity and data confidentiality of the symmetric encryption are also important also it enables to execute required computations on this encrypted data. � 2022 Institute of Advanced Engineering and Science. …”
Article -
20
Investigation of data encryption algorithm for secured transmission of electrocardiograph (ECG) signal
Published 2018“…The security and privacy features of the system protect the authenticity and confidentiality of the patient's medical data and are implemented using security enhancing techniques. This problem will be solved by encrypting the signals, using the proposed fully homomorphic encryption (FHE) technique. …”
Get full text
Get full text
Conference or Workshop Item
