Search Results - (( security publications using algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- security publications »
- application testing »
- publications using »
- testing algorithm »
- java application »
- using algorithm »
-
1
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
4
Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar
Published 2012“…The purpose of this study was to design and develop new secure plug-in on Microsoft Outlook using integration of symmetric and asymmetric cryptographic algorithm. …”
Get full text
Get full text
Thesis -
5
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
Published 2003“…Utilizing the properties of Lucas functions introduced a public key system based on Lucas functions instead of exponentiation, which offer a good alternative to the most publicly used exponential public key system RSA. …”
Get full text
Get full text
Thesis -
6
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Mobile information security should be enhanced to new scheme that more simple and use the small key size, also high security level. …”
Get full text
Get full text
Conference or Workshop Item -
7
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…The results show that the new algorithm AES-ECC-RSA (AER) was more secure than the remaining algorithms and it proved to be more secure but needed longer time to encrypt data and decrypt data.…”
Get full text
Get full text
Get full text
Thesis -
8
Secure file sharing with public key infrastructure (PKI) enablement / Noor Azlina Ismail @ Hassan
Published 2015“…This system will used RSA and SHA-256 to produce digital signature because both of the algorithm consist more advantages than other algorithm which is suitable to used to protect document in current insecure network. …”
Get full text
Get full text
Thesis -
9
-
10
Secured electrocardiograph (ECG) signal using partially homomorphic encryption technique–RSA algorithm
Published 2020“…Then, partially homomorphic encryption (PHE) technique - Rivest-Shamir-Adleman (RSA) algorithm was used to encrypt the ECG signal by using the public key. …”
Get full text
Get full text
Get full text
Article -
11
-
12
-
13
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
14
New Cryptographic Algorithms for Enhancing Security of Voice Data
Published 2010“…Cryptographic systems may be used to achieve VoIP security, but their impact on the Quality of Services (QoS) should be minimized. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
16
-
17
-
18
Hide information usings cryptography based on android platform / Ahmad Farhan Ahmad Husni
Published 2013“…DES algorithm uses public-key system means the algorithm for encrypting and decrypting a message is public know. …”
Get full text
Get full text
Thesis -
19
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…Information security was traditionally achieved by the use of encryption of data, but several stored and transmitted data in existing MES are not encrypted. …”
Get full text
Get full text
Get full text
Proceeding Paper -
20
Proposed method for enhancing quantum bit error rate using quantum key distribution technique
Published 2014“…Therefore this high error rate needs to be reduced for better security using two channels qkd. With the current emergence of quantum computers many security algorithm that could take classical computer years to break could now be broken in matter of seconds. …”
Get full text
Get full text
Conference or Workshop Item
