Search Results - (( process information security algorithm ) OR ( java application using algorithm ))
Search alternatives:
- process information »
- java application »
- using algorithm »
-
1
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
2
Text messaging encryption system
Published 2012“…The only way to read the information is to know the method on how message is being masked,in this case knowing the algorithm used to encrypt the message. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
Get full text
Get full text
Get full text
Article -
4
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The new replication process will also be used in e-commerce application to secure user transaction information. …”
Get full text
Get full text
Thesis -
5
Smart student timetable planner
Published 2025“…The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…This paper shows the results of processing time of data encryption between asymmetric key algorithm (RSA) and symmetric key algorithm (AES) which includes its key-distribution processing time with client’s public key (RSA) from small to large amount of data. …”
Get full text
Get full text
Get full text
Proceeding Paper -
7
Designing New Block Cipher Based On Genetic Algorithm Approach
Published 2024“…To satisfy the information security requirements and to enhance the information security, we need secured communication and data which can be attained by encrypting the data. …”
Article -
8
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
9
-
10
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
11
A block cipher based on genetic algorithm
Published 2016“…Therefore, this new proposed block cipher can be used by countries, organizations, stakeholders or interested parties as one of the secure algorithm to increase the protection of the information and also will contribute as an alternative to other cryptographic algorithms in computer security research.…”
Get full text
Get full text
Get full text
Thesis -
12
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…The deployment of network security procedures requires the implementation of Cryptographic algorithms. …”
Get full text
Get full text
Thesis -
13
Securing password authentication using MD5 algorithm
Published 2014“…Apart from protection, a step toward perfect security has taken by using MD5 algorithm…”
Get full text
Get full text
Undergraduates Project Papers -
14
Image encryption and decryption using 3D-AES block cipher algorithm / Engku Maryam Syahdina Engku Safruddin
Published 2018“…Subsequent to this, this project focus on how to measure the security analysis on randomness test of image. The result of this project is the characteristics of 3D-AES is very high in security and this algorithm is resistance to all identified attacks, the system effectiveness and accuracies of the process. …”
Get full text
Get full text
Thesis -
15
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007“…In bulk data transfer, especially in large messages, the secured processing time takes much longer than non-secured processes. …”
Get full text
Get full text
Conference or Workshop Item -
16
Improving security performance with parallel crypto operations in SSL bulk data transfer
Published 2009“…For example, in bulk data transfer, especially in large messages, the secured processing time takes much longer than non-secured processes. …”
Get full text
Get full text
Get full text
Article -
17
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…In the first and second methods, the visual video information is secured by encrypting limited transformed coefficients using AES algorithm. …”
Get full text
Get full text
Thesis -
18
-
19
Secured electrocardiograph (ECG) signal using fully homomorphic encryption technique
Published 2020“…The present situation demands extremely secured details of patients. Consequently, securing the patient's information from ransomware is the main challenge in the healthcare industry. …”
Get full text
Get full text
Article -
20
The Performance of the 3DES and Fernet Encryption in Securing Data Files
Published 2024journal::journal article
