Search Results - (( technology implementation encryption algorithm ) OR ( java implementation using algorithm ))
Search alternatives:
- implementation encryption »
- implementation using »
- java implementation »
- using algorithm »
-
1
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
2
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
3
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
4
Biometrics electronic purse
Published 1999“…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
Get full text
Get full text
Get full text
Proceeding Paper -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Secure E-Voting With Blind Signature
Published 2003“…E-Voting is implemented by employing Java socket technology and BouncyCastle cryptography provider. …”
Get full text
Get full text
Conference or Workshop Item -
7
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The advent of Industry 4.0 has propelled the Industrial Internet of Things (IIoT) as one of the essential enabling technologies for its successful adoption and implementation. …”
Get full text
Get full text
Thesis -
8
-
9
-
10
Implementation of a parallel XTS encryption mode of operation
Published 2014Get full text
Get full text
Get full text
Article -
11
Design and implementation of advanced encryption standard using verilog HDL
Published 2022“…The focus of this paper is to match with the existing cryptography algorithm, 128-bit Advanced Encryption Algorithm and improving the processing speed for the design with hardware implementation. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004Get full text
Get full text
Thesis -
13
Performance comparison encryption of IPSEC VPN encryption techniques / Nur Hasyimah Mohd Ridzuan
Published 2015“…By varying the combination of encryption algorithm 3DES and AES 256 with two hashing type SHA-1 and MD5, the performance of each algorithm was compared and analyzed via Window 7 environment. …”
Get full text
Get full text
Thesis -
14
Performance comparison of encryption IPsec VPN encryption techniques / Nur Hasyimah Mohd Ridzuan and Ruhani Ab Rahman
“…By varying the combination of encryption algorithm 3DES and AES 256 with two hashing type SHA-1 and MD5, the performance of each algorithm was compared and analyzed via Window 7 environment. …”
Get full text
Get full text
Article -
15
Design and Implementation of Advanced Encryption Standard Using Verilog HDL
Published 2020“…The focus of this paper is to match with the existing cryptography algorithm, 128-bit Advanced Encryption Algorithm and improving the processing speed for the design with hardware implementation. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
The Performance of the 3DES and Fernet Encryption in Securing Data Files
Published 2024journal::journal article -
17
-
18
-
19
Encryption Technology on Windows Workstation
Published 2004“…The result of this study will be an enhanced version of current encryption technology that is ready to be implemented or applied by interested parties.…”
Get full text
Get full text
Final Year Project -
20
Cryptography: A New Approach of Classical Hill Cipher
Published 2013Get full text
Get full text
Article
