Search Results - (( process information security algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- process information »
- application testing »
- testing algorithm »
- java application »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…This paper shows the results of processing time of data encryption between asymmetric key algorithm (RSA) and symmetric key algorithm (AES) which includes its key-distribution processing time with client’s public key (RSA) from small to large amount of data. …”
Get full text
Get full text
Get full text
Proceeding Paper -
3
Designing New Block Cipher Based On Genetic Algorithm Approach
Published 2024“…To satisfy the information security requirements and to enhance the information security, we need secured communication and data which can be attained by encrypting the data. …”
Article -
4
A block cipher based on genetic algorithm
Published 2016“…Therefore, this new proposed block cipher can be used by countries, organizations, stakeholders or interested parties as one of the secure algorithm to increase the protection of the information and also will contribute as an alternative to other cryptographic algorithms in computer security research.…”
Get full text
Get full text
Get full text
Thesis -
5
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…The deployment of network security procedures requires the implementation of Cryptographic algorithms. …”
Get full text
Get full text
Thesis -
6
Securing password authentication using MD5 algorithm
Published 2014“…Apart from protection, a step toward perfect security has taken by using MD5 algorithm…”
Get full text
Get full text
Undergraduates Project Papers -
7
Image encryption and decryption using 3D-AES block cipher algorithm / Engku Maryam Syahdina Engku Safruddin
Published 2018“…Subsequent to this, this project focus on how to measure the security analysis on randomness test of image. The result of this project is the characteristics of 3D-AES is very high in security and this algorithm is resistance to all identified attacks, the system effectiveness and accuracies of the process. …”
Get full text
Get full text
Thesis -
8
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007“…In bulk data transfer, especially in large messages, the secured processing time takes much longer than non-secured processes. …”
Get full text
Get full text
Conference or Workshop Item -
9
Improving security performance with parallel crypto operations in SSL bulk data transfer
Published 2009“…For example, in bulk data transfer, especially in large messages, the secured processing time takes much longer than non-secured processes. …”
Get full text
Get full text
Get full text
Article -
10
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…In the first and second methods, the visual video information is secured by encrypting limited transformed coefficients using AES algorithm. …”
Get full text
Get full text
Thesis -
11
-
12
Secured electrocardiograph (ECG) signal using fully homomorphic encryption technique
Published 2020“…The present situation demands extremely secured details of patients. Consequently, securing the patient's information from ransomware is the main challenge in the healthcare industry. …”
Get full text
Get full text
Article -
13
The Performance of the 3DES and Fernet Encryption in Securing Data Files
Published 2024journal::journal article -
14
Encrypted mobile messaging application using 3D-AES block cipher cryptography algorithm / Aida Najihah Mohd Khlubi
Published 2019“…This paper analyzes how information sent through mobile messaging application is being secured. …”
Get full text
Get full text
Student Project -
15
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…The existing sequential and the proposed parallel algorithms were simulated successfully while preserving security properties. …”
Get full text
Get full text
Thesis -
16
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
17
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
18
-
19
Encryption method for SCADA security enhancement
Published 2014Get full text
Get full text
Get full text
Article -
20
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Mobile information security should be enhanced to new scheme that more simple and use the small key size, also high security level. …”
Get full text
Get full text
Conference or Workshop Item
