Search Results - (( security application testing algorithm ) OR ( java application design algorithm ))
Search alternatives:
- security application »
- application testing »
- application design »
- testing algorithm »
- java application »
- design algorithm »
-
1
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
2
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
3
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
4
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
5
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
6
-
7
Security analysis of blowfish algorithm
Published 2013Get full text
Get full text
Conference or Workshop Item -
8
An optimized attack tree model for security test case planning and generation
Published 2018“…By leveraging on the optimized attack tree algorithm used in this research work, the threat model produces efficient test plans from which adequate test cases are derived to ensure a secured web application is designed, implemented and deployed. …”
Get full text
Get full text
Article -
9
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008Get full text
Get full text
Conference or Workshop Item -
10
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
11
Security analysis of blowfish algorithm
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Fifteen files were then chosen to be the testing materials to examine the level of accuracy and security of the specific developed prototype. …”
Get full text
Get full text
Undergraduates Project Papers -
13
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Among all of the cryptography measures, Secure Hash Algorithm 3 (SHA-3) is the newest and secure cryptographic hash algorithm in the current electronic industry. …”
Get full text
Get full text
Thesis -
14
-
15
Secure mobile AES encryptor (SMAE)
Published 2016“…The reason the AES encryption algorithm selected is because it is considered as one of the most secure encryption algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
16
Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT
Published 2024journal::journal article -
17
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
18
An Enhanced Ant Colony Optimisation Algorithm with the Hellinger Distance for Shariah-Compliant Securities Companies Bankruptcy Prediction
Published 2024“…The effectiveness of HD-AntMiner is benchmarked against established classifiers—PART and J48—as well as the conventional Ant-Miner, using public datasets and a specialized dataset of 759 Shariah-compliant securities companies in Malaysia. Utilising the Friedman test and F-score for validation, HD-AntMiner demonstrates superior performance in handling imbalanced datasets compared to other algorithms, as affirmed by the Friedman test. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Design and Implementation of a Genetic Algorithm-Based Block Cipher For Enhanced Cryptographic Security
Published 2025conference output::conference proceedings::conference paper -
20
An Improved Rectangle Lightweight Block Cipher Based On 3d Rotation Method
Published 2024thesis::doctoral thesis
