Search Results - (( programming a encryption algorithm ) OR ( java based optimization algorithm ))
Search alternatives:
- programming a »
- a encryption »
- java »
-
1
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
Published 2017“…The results from this research have proved that the AES is very effective in terms of time taken to encrypt and decrypt documents, strength of the algorithm and the reliability of the program. …”
Get full text
Get full text
Thesis -
2
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…Advanced Encryption Standard algorithm is being used to encrypt the text messaging. …”
Get full text
Get full text
Student Project -
3
Encryption using FPGA
Published 2008“…The AES algorithm is a block cipher that can encrypt and decrypt digital information. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…ECC, AES, and RSA algorithms will be used to encrypt the files to enhance security data on the cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
5
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…This system is implemented on a Windows platform with Visual Basic as a programming language and 3-DES as a main encryption algorithm. …”
Get full text
Get full text
Thesis -
6
CHAOS BASED BLOCK ENCRYPTOR
Published 2008“…This project is basically a block encryption to protect block of data. In this project we will propose encryption algorithm which offer less computational complexity and also provide securing data not only during transmission but also during storage. …”
Get full text
Get full text
Final Year Project -
7
-
8
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…The optimization of a computationally intensive algorithm such as this on a mobile platform is challenging due to the limited resources available. …”
Get full text
Get full text
Conference or Workshop Item -
9
Text messaging encryption system
Published 2012“…Text Messaging Encryption system is a text message encryption and decryption.Encryption is a process of masking a message so that it is unreadable.Encryption is important to avoid other people to read certain information. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…Hence, the objective of this research is to propose suitable and optimize algorithm for ANPR system on Android mobile phone. …”
Get full text
Get full text
Get full text
Book -
11
A framework for GPU-accelerated AES-XTS encryption in mobile devices
Published 2011“…One important application area that can benefit from GPUs power is storage encryption in mobile devices. In this paper, we introduce a GPU-accelerated framework for storage encryption in mobile devices using the XTS-AES encryption algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
12
Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms
Published 2019“…Hence, in this research has been proposed a hybrid structure of Dynamic AES (DAES) and Blowfish algorithms. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Therefore, in this paper, we proposed Dynamic tasks scheduling algorithm based on attribute reduction with an enhanced hybrid Genetic Algorithm and Particle Swarm Optimization for optimal device selection. …”
Get full text
Get full text
Article -
14
-
15
Security analysis of data transmission in an IoT based platform for telemedicine
Published 2021“…This study proposes a modified folded pipeline architecture for resource restriction applications with an AES algorithm. …”
Get full text
Get full text
Get full text
Article -
16
Implementation of AES algorithm into information investigation autopsy (IIA) / Ahmad Wafiy Hamad Zaki
Published 2013Get full text
Get full text
Student Project -
17
Analysis of Rabin-p and HIME(R) encryption scheme on IoT platform
Published 2020“…The algorithm of Rabin-p tested by utilizing the C-programming and implemented on a microprocessor system namely Raspberry Pi 3 model B. …”
Get full text
Get full text
Get full text
Article -
18
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
19
Encryption Technology on Windows Workstation
Published 2004“…The purpose of this study is to develop a new type of encryption methodbased on RSAtechnique. …”
Get full text
Get full text
Final Year Project -
20
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
Get full text
Get full text
Get full text
Monograph
