Search Results - (( security application using algorithm ) OR ( java implementation during algorithm ))
Search alternatives:
- implementation during »
- security application »
- java implementation »
- during algorithm »
- using algorithm »
-
1
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
3
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
5
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
6
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
7
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
8
Improving the security of LBlock lightweight algorithm using bit permutation
Published 2013Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Secure Socket Layer (SSL) is one of the most widely used security protocols on the Internet. …”
Get full text
Get full text
Thesis -
10
Security analysis of blowfish algorithm
Published 2013Get full text
Get full text
Conference or Workshop Item -
11
Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications
Published 2023Conference Paper -
12
Security factors based evaluation of verification algorithm for an IoT access system
Published 2023Conference Paper -
13
New Cryptographic Algorithms for Enhancing Security of Voice Data
Published 2010“…Security is of concern whenever open networks are to be used. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Web-Application for securing message using Steganography with LSB Algorithm and Hybrid Encryption / Muhammad Khairul Amin Mohd Nai and Siti Rahayu Abdul Aziz
Published 2021“…Web-Application for Securing Message using Steganography with LSB Algorithm and Hybrid Encryption is a web application that encrypt the messages user input and hide it in an image file to give an utmost security for the messages to be delivered and received. …”
Get full text
Get full text
Get full text
Book Section -
15
Web-Application for securing message using Steganography with LSB Algorithm and Hybrid Encryption / Muhammad Khairul Amin Mohd Nai and Siti Rahayu Abdul Aziz
Published 2021“…Web-Application for Securing Message using Steganography with LSB Algorithm and Hybrid Encryption is a web application that encrypt the messages user input and hide it in an image file to give an utmost security for the messages to be delivered and received. …”
Get full text
Get full text
Get full text
Book Section -
16
Vehicle Monitoring System Using Motion Detection Algorithms For USM Campus.
Published 2007Get full text
Get full text
Conference or Workshop Item -
17
Securing password authentication using MD5 algorithm
Published 2014“…Apart from protection, a step toward perfect security has taken by using MD5 algorithm…”
Get full text
Get full text
Undergraduates Project Papers -
18
Security analysis of blowfish algorithm
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Enhanced chaotic image encryption algorithm based on Baker's map
Published 2003Get full text
Get full text
Article -
20
Security mechanism for wireless Mobile Ad Hoc Networks (MANET)
Published 2006“…The One Time Pad algorithm and Caesar Cipher algorithms are implemented using LabVIEW software. …”
Get full text
Get full text
Student Project
