Search Results - (( programming current encryption algorithm ) OR ( java application stemming algorithm ))

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari by Nazari, Khairul Nashran

    Published 2017
    “…The results from this research have proved that the AES is very effective in terms of time taken to encrypt and decrypt documents, strength of the algorithm and the reliability of the program. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Text messaging encryption system by Sundara Morthty, Nirmala Devi

    Published 2012
    “…Text Messaging Encryption system is a text message encryption and decryption.Encryption is a process of masking a message so that it is unreadable.Encryption is important to avoid other people to read certain information. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Encryption Technology on Windows Workstation by Amdan, Zulkhaimi

    Published 2004
    “…This study is done because current encryption method in Windows environment is quite weak (e.g.: Windows password) and easily breakable using program like LC4(@stake LC4, about). …”
    Get full text
    Get full text
    Final Year Project
  4. 4
  5. 5

    Analysis of Rabin-p and HIME(R) encryption scheme on IoT platform by Abd Nashir, Abdul Muhaimin, Syed Adnan, Syed Farid, Hashim, Habibah, Mat Isa, Mohd Anuar, Mahad, Zahari, Asbullah, Muhammad Asyraf

    Published 2020
    “…The result shows Rabin-p encryption scheme runtime is faster at 50% and current withdraw less at 1.3% compared to HIME(R).…”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The design combined symmetric key encryption (AES) for the message encryption with the asymmetric key encryption (ECC). …”
    Get full text
    Get full text
    Thesis
  8. 8

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The obvious amount of lost money of victims has led to many court cases where victim and theft claims the ownership of the program and the winner is who has a good lawyer. Many programming languages are used for programming; Java programming language is known to be most common due to its features, the use of this popular language increases an attacker's ability to steal intellectual property (IP), as the source program is translated to an intermediate format retaining most of the information such as meaningful variables names present in source code. …”
    Get full text
    Get full text
    Thesis