Search Results - (( security application server algorithm ) OR ( java application using algorithm ))
Search alternatives:
- security application »
- application server »
- server algorithm »
- java application »
- using algorithm »
-
1
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
2
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The new replication process will also be used in e-commerce application to secure user transaction information. …”
Get full text
Get full text
Thesis -
3
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
4
-
5
Mobile application design for protecting the data in cloud using enhanced technique of encryption
Published 2024journal::journal article -
6
Smart student timetable planner
Published 2025“…The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
A Study Of Salting Method for Image Protection
Published 2013“…This study will review various algorithm to be used in securing the password, including password hashing algorithms MD5 and SHA-1, along with types of commonly used attack for this type of situation. …”
Other -
8
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
Published 2016“…In this thesis, we have proposed a security solution based on an ECC algorithm to improve the security and the performance of the data by dividing the file content and encrypting it on both the server and the client side. …”
Get full text
Get full text
Thesis -
9
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…The existing sequential and the proposed parallel algorithms were simulated successfully while preserving security properties. …”
Get full text
Get full text
Thesis -
10
Developing a prototype e-commerce application with credit card validation and secure transaction
Published 2005“…Therefore many are actually switching to e-commerce applications. Anyhow,the problem with e-commerce application is that many of them are not secure.This application is designed to enhance the e-commerce applications with additional security items.The security enhancement made was integrating an encryption module that secures the data that are stored in the databases. …”
Get full text
Get full text
Undergraduates Project Papers -
11
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007Get full text
Get full text
Conference or Workshop Item -
12
-
13
On protecting data storage in mobile cloud computing paradigm
Published 2014Get full text
Get full text
Get full text
Article -
14
Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure
Published 2022“…Cryptographic protocols Secure Socket Layer (SSL) and Transport Layer Security (TLS) enable data encryption and authentication between various homogeneous and heterogeneous devices such as servers, computers, and software applications running all over a network. …”
Get full text
Get full text
Get full text
Proceeding -
15
SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems
Published 2021“…The proposed scheme extends the Kerberos workflow and utilizes the AES-ECC algorithm for efficient encryption keys management and secure communication between the edge nodes and fog node servers to establish secure mutual authentication. …”
Get full text
Get full text
Article -
16
-
17
Implementing RC5 Encrtption Algorithm On a Web Based Medical Cosultation System
Published 2007“…Even though security requirements in medical care are traditionally high, most computerized medical care applications lack sophisticated security measures or focus only on single security objectives. …”
Get full text
Get full text
Thesis -
18
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
19
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
