Search Results - (( program data protection algorithm ) OR ( java simulation optimisation algorithm ))

Refine Results
  1. 1
  2. 2

    Encryption using FPGA by Nor Robaini, Ibrahim

    Published 2008
    “…Advanced Encryption Standard (AES), a Federal Information Processing Standard (FIPS), is an approved cryptographic algorithm that can be used to protect electronic data. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3
  4. 4

    Data Hiding Techniques In Digital Images by Al Thloothi, Salah Ramadan

    Published 2003
    “…Hiding data provides a good layer of protection on the secret message, so the purpose of this thesis is to study the data hiding techniques in digital images as a new and powerful technology capable of solving important practical problems. …”
    Get full text
    Get full text
    Thesis
  5. 5

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  6. 6

    CHAOS BASED BLOCK ENCRYPTOR by SARIN, FARHANA

    Published 2008
    “…This project is basically a block encryption to protect block of data. In this project we will propose encryption algorithm which offer less computational complexity and also provide securing data not only during transmission but also during storage. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Implementation of hashed cryptography algorithm based on cryptography message syntax by Ali, Mohammed Ahnaf

    Published 2019
    “…The coding is designed in such a way that there is a malicious attack to destroy the data. The system will automatically protect data and thus retrieve data at the end of the system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…Obfuscation (Obfu) is a practice to make the programming code complicated to protect the Intellectual Property (IP) and prevent prohibited software Reverse Engineering (RE). …”
    Get full text
    Get full text
    Thesis
  11. 11

    Security analysis of data transmission in an IoT based platform for telemedicine by Olanrewaju, Rashidah Funke, Amuda, Idowu Rahaman, Hassan Abdalla Hashim, Aisha

    Published 2021
    “…The sharing of confidential personal data such as medical data continues to take place regularly across the globe; it is therefore crucial to protect data from unauthorized access by adversaries. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Obfuscatable aggregatable signcryption scheme with PadSteg for unattended devices in IoT systems by Uwadiegwu, Inyama Victor

    Published 2019
    “…Obfuscatable Aggregatable Signcryption (OASC) is the combination of cryptography technique such as digital signature with data encryption and obfuscation to protect data in the IoT system. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Analysis of image steganography using AES / Nur Amira Muhamad Ghazali by Muhamad Ghazali, Nur Amira

    Published 2020
    “…Data hiding and encapsulation are both important concepts of Data hiding emphasizes so much on data protection and encapsulation emphasizes mostly on covering the complexity of the program. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector by Abdulkader, Zaid A.

    Published 2018
    “…Our framework categorises the requirements for the VANET protection design via modifying AODV into three: Insure the Availability of VANET and its Services Algorithm (IAVSA), Protect Data Dissemination Algorithm (PDDA), and Secure Vehicles Authentication Algorithm (SVAA). …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    E-Raser: file shredder application with content replacement by using random words function by Mohd Nahar, Nur Farah Aqilah, Ab Rahman, Nurul Hidayah, Mohammad, Kamarudin Malik

    Published 2018
    “…Data shredding indicates a process of irreversible file destruction while file shredder is the program designed to render computer-based files unreadable by implementing overwriting method to destroy data in the content of a file. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Error correction for CDMA code in mobile communication by Tiong S.K., Tan C.H., Ding J., Ismail M.

    Published 2023
    “…Thus, this research is carried out in order to find a better and effective way to be included in CDMA system to protect, detect and correct the error bits while information data is transmitted through various kinds of environments. …”
    Conference paper
  19. 19
  20. 20