Search Results - (( software information security algorithm ) OR ( java application using algorithm ))
Search alternatives:
- software information »
- java application »
- using algorithm »
-
1
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
2
Text steganalysis using evolution algorithm approach
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Text messaging encryption system
Published 2012Get full text
Get full text
Undergraduates Project Papers -
4
-
5
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
Get full text
Get full text
Thesis -
6
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
7
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The new replication process will also be used in e-commerce application to secure user transaction information. …”
Get full text
Get full text
Thesis -
8
DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE
Published 2019“…Basically it is used for message digest. One of the algorithms in hash function is RIPEMD-160. The RIPEMD-160 can improve the security in storing information. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
9
-
10
Implementation of AES algorithm into information investigation autopsy (IIA) / Ahmad Wafiy Hamad Zaki
Published 2013“…The objectives of this project are to apply the encryption algorithm into these tools for securing the information collected by keystroke logging mechanism. …”
Get full text
Get full text
Student Project -
11
Securing password authentication using MD5 algorithm
Published 2014Get full text
Get full text
Undergraduates Project Papers -
12
Improving the security model of software define networks
Published 2023“…The issues which threatens the security of the network could cause disclosure private information and conservation in an enterprise. …”
text::Final Year Project -
13
-
14
Symmetric Key Size for Different Level of Information Classification
Published 2006“…The classification depends on the level of damage to an organization or to national security when the information is disclosed. Therefore confidential information is normally protected by using cryptographic algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
15
DESIGN AND IMPLEMENTATION OF RIPEMD-160 HASH FUNCTION USING VERILOG HDL
Published 2022“…RIPEMD-160 is one of the algorithms in hash function that can improve the security in storing information. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
16
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item -
17
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
18
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
19
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
20
Encrypted mobile messaging application using 3D-AES block cipher cryptography algorithm / Aida Najihah Mohd Khlubi
Published 2019“…This paper analyzes how information sent through mobile messaging application is being secured. …”
Get full text
Get full text
Student Project
