Search Results - (( process implementation private algorithm ) OR ( java implication _ algorithm ))
Search alternatives:
- process implementation »
- implementation private »
- private algorithm »
- java implication »
-
1
-
2
Implementation of Lamport Digital Signature Scheme in Station-to-station Protocol / Nur Ainaa Mat Abu ... [et al.]
Published 2021“…Thus, in this paper propose the new algorithm in Station to Station (STS) protocol by implementing Lamport digital signature to provide the authentication in DHKE protocol.…”
Get full text
Get full text
Monograph -
3
Development of person identification application for video surveillance
Published 2022“…In the real world, CCTVs are implemented and allocated in public and private environment, to ensure public safety. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
-
5
CleverSecure ONLINE System
Published 2008“…CleverSecure Online System (COS) implements on the use of popular algorithm which is Blowfish algorithm to encrypt and decrypt the data that can be save in directory or send through email. …”
Get full text
Get full text
Final Year Project -
6
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
7
Implementation of Schnorr Digital Signature into Station-to-Station Protocol / Nurul Mahira Budin, Nor Hafikah Othman and Nur Izzatie Farhana Ahmad Fauzan
Published 2018“…However, STS doesn't have complete element as it's only a procedure method. Thus, we implement Schnorr Digital Signature into STS protocol to use Schnorr elements in completing the key exchange process. …”
Get full text
Get full text
Student Project -
8
Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment
Published 2024“…Hadoop distributed architecture is used to design and implement the power private cloud computing cluster. …”
Article -
9
An improved diabetes risk prediction framework : An Indonesian case study
Published 2018“…In conclusion,DRPF is implementable as prototype and has been highly accepted by Indonesian practitioners as aid for the diagnostics of diabetes.…”
Get full text
Get full text
Get full text
Thesis -
10
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…Based on the results, even though the proposed solution requires double hashing process it is still acceptable to be implemented due to it only require lower processing time and power/memory usage.…”
Get full text
Get full text
Thesis -
11
-
12
Enhancing The Randomness Of Symmetric Key Using Genetic Algorithm
Published 2019“…As the advancement of technology in Artificial Intelligence (AI), Genetic Algorithm (GA) is implemented to generate the best-fit key in symmetric-key cryptography. …”
Get full text
Get full text
Get full text
Article -
13
Mathematical modelling on communication between two parties / Nor Anees Asyiqin Md Disa, Khairunnisa Munawarah Khairul Anwar and Aniesa Farhana Mazlan
Published 2022“…Since the key exchange process is successful, we think the offered methods are effective.…”
Get full text
Get full text
Student Project -
14
-
15
A modified group authentication scheme for machine type communication in LTE/LTE-a networks
Published 2018“…Meeting the necessities of control usage of devices and mass implement transmission is a key issue in the implementation of MTC in the Long Term Evolution/Long Term Evolution Advanced systems. …”
Get full text
Get full text
Thesis -
16
Secure E-Voting With Blind Signature
Published 2003“…The provider, which is an open source library, is used to provide the secure communication channel. The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
17
-
18
The impact of new technologies (AI, Blockchain & Big Data) in the accounting profession
Published 2025“…The need for traditional accounting-related employment will decline as AI systems become increasingly capable of handling more mundane activities like data entry, transaction processing, and even simple audits. Furthermore, the implementation of blockchain technology raises concerns about data privacy, the irreversibility of errors, and the misuse of private information even as it improves transaction security and transparency. …”
Get full text
Get full text
Article -
19
Evaluation of Security Metric for Artificial Internet of Things Smart Locking System
Published 2023“…This system employs the Raspberry Pi controller to grant access to a private premises without relying on a physical keys like access cards. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
A study of watermarking methods in medical application
Published 2004“…Among these three methods, LSB method has the most capacity of watermark and fastest rate in embedding process. These three algorithms implemented in this project are shown to be sensitive for the attack. …”
Get full text
Get full text
Thesis
