Search Results - (( process implementing private algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2

    Implementation of Lamport Digital Signature Scheme in Station-to-station Protocol / Nur Ainaa Mat Abu ... [et al.] by Mat Abu, Nur Ainaa, Mohamad Sarif, Siti Nurfazliana, Mohammad Zuki, Intan Nur Athirah, Udin, Md Nizam

    Published 2021
    “…Thus, in this paper propose the new algorithm in Station to Station (STS) protocol by implementing Lamport digital signature to provide the authentication in DHKE protocol.…”
    Get full text
    Get full text
    Monograph
  3. 3

    Development of person identification application for video surveillance by Soon, Phaik Ching

    Published 2022
    “…In the real world, CCTVs are implemented and allocated in public and private environment, to ensure public safety. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4
  5. 5

    CleverSecure ONLINE System by Ab. Kadir, Shamimi

    Published 2008
    “…CleverSecure Online System (COS) implements on the use of popular algorithm which is Blowfish algorithm to encrypt and decrypt the data that can be save in directory or send through email. …”
    Get full text
    Get full text
    Final Year Project
  6. 6
  7. 7
  8. 8

    Implementation of Schnorr Digital Signature into Station-to-Station Protocol / Nurul Mahira Budin, Nor Hafikah Othman and Nur Izzatie Farhana Ahmad Fauzan by Budin, Nurul Mahira, Othman, Nor Hafikah, Ahmad Fauzan, Nur Izzatie Farhana

    Published 2018
    “…However, STS doesn't have complete element as it's only a procedure method. Thus, we implement Schnorr Digital Signature into STS protocol to use Schnorr elements in completing the key exchange process. …”
    Get full text
    Get full text
    Student Project
  9. 9

    Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment by Al-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S.

    Published 2024
    “…Hadoop distributed architecture is used to design and implement the power private cloud computing cluster. …”
    Article
  10. 10

    An improved diabetes risk prediction framework : An Indonesian case study by Sutanto, Daniel Hartono

    Published 2018
    “…In conclusion,DRPF is implementable as prototype and has been highly accepted by Indonesian practitioners as aid for the diagnostics of diabetes.…”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil by Shahrul Kamil, Aiman Nurrasyid

    Published 2020
    “…Based on the results, even though the proposed solution requires double hashing process it is still acceptable to be implemented due to it only require lower processing time and power/memory usage.…”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Enhancing The Randomness Of Symmetric Key Using Genetic Algorithm by Zakaria, Afiqah Zahirah, Ramli, Sofia Najwa, Wen, Chuah Chai, Mohd Foozy, Cik Feresa, Palaniappan, P. Siva Shamala, Othman, Nur Fadzilah

    Published 2019
    “…As the advancement of technology in Artificial Intelligence (AI), Genetic Algorithm (GA) is implemented to generate the best-fit key in symmetric-key cryptography. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16

    A modified group authentication scheme for machine type communication in LTE/LTE-a networks by Ismail, Haqi Khalid

    Published 2018
    “…Meeting the necessities of control usage of devices and mass implement transmission is a key issue in the implementation of MTC in the Long Term Evolution/Long Term Evolution Advanced systems. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The provider, which is an open source library, is used to provide the secure communication channel. The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    The impact of new technologies (AI, Blockchain & Big Data) in the accounting profession by Hasan, Zulkifli, Che Hassan, Nor Asmawani

    Published 2025
    “…The need for traditional accounting-related employment will decline as AI systems become increasingly capable of handling more mundane activities like data entry, transaction processing, and even simple audits. Furthermore, the implementation of blockchain technology raises concerns about data privacy, the irreversibility of errors, and the misuse of private information even as it improves transaction security and transparency. …”
    Get full text
    Get full text
    Article
  20. 20

    Evaluation of Security Metric for Artificial Internet of Things Smart Locking System by Siti Nur Hanani, Mohd Rizal

    Published 2023
    “…This system employs the Raspberry Pi controller to grant access to a private premises without relying on a physical keys like access cards. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis