Search Results - (( using key problems algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- java application »
- key problems »
- using key »
-
1
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Signatory however use a special Digital Signature Application which store the secret private key. …”
Get full text
Get full text
Thesis -
3
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Recent industrial solutions to overcome the problem includes using manual registration, using 125kHz proximity card, using mobile application to scan QR code and others. …”
Get full text
Get full text
Get full text
Academic Exercise -
4
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. …”
Get full text
Get full text
Thesis -
5
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
6
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
7
Static and self-scalable filter range selection algorithms for peer-to-peer networks
Published 2011“…The research works were implemented by simulation in which it was used to identify the selection problem, implementation of the proposed algorithms and the measurement of the results. …”
Get full text
Get full text
Thesis -
8
A new cryptographic algorithm based on decomposition problem in elliptic curve cryptography / Hilyati Hanina Zazali
Published 2012“…The first algorithm determines an approach of performing key exchanges between two subgroups for Decomposition Problem and three subgroups for Triple Decomposition Problem. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Cryptography: A New Approach of Classical Hill Cipher
Published 2013“…Nevertheless, these enhanced Hill cipher algorithms still face the non invertible key matrix problem. …”
Get full text
Get full text
Article -
10
Hybrid multiobjective genetic algorithm for integrated dynamic scheduling and routing of jobs and automated guided vehicles in flexible manufacturing systems
Published 2014“…The comparison of the result of the developed integrated algorithm using two benchmark FMS scheduling algorithms datasets is conducted. …”
Get full text
Get full text
Thesis -
11
-
12
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
13
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…The computation results show that the key generation process using the modified algorithm is around three times faster than the old implementation. …”
Get full text
Get full text
Thesis -
14
New Cryptographic Algorithms for Enhancing Security of Voice Data
Published 2010“…VoIP is usually used by public users resulting in a key exchange problem and a trusted intermediate authority normally takes this responsibility. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Thus, it is suitable for mobile devices, it uses 160 bits key and provides the same security as RSA 1024 bits key.Some benefits are expected from this study to improve the encryption algorithm for mobile security.…”
Get full text
Get full text
Conference or Workshop Item -
16
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
17
A novel enhancement technique of the hill cipher for effective cryptographic purposes.
Published 2011“…An algorithm proposed for involutory key matrix generation is also implemented in the proposedalgorithm. …”
Get full text
Get full text
Get full text
Article -
18
-
19
-
20
