Search Results - (( _ application a algorithm ) OR ( its application security algorithm ))*
Search alternatives:
- application security »
- application a »
- a algorithm »
-
1
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
2
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
4
Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT
Published 2024journal::journal article -
5
A study of mobile IP and its security aspects in a LAN environment / Suhaila Che Ismail
Published 1998“…A security criteria, outlines the authentication algorithm and key to be used during the registration process. …”
Get full text
Get full text
Thesis -
6
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
7
-
8
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
9
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
10
-
11
VOICE RECOGNITION FOR SECURITY PURPOSES
Published 2007Get full text
Get full text
Final Year Project -
12
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…This research aim is to study the performance of an improvised Genetic Algorithm (GA) by formulating its problem-specific algorithm for network intrusion problem. …”
Get full text
Get full text
Thesis -
13
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
14
-
15
Information Security Analysis and Solution using LSB Steganography and AES Cryptographic Algorithm
Published 2023“…An essential component of data exchange is security and confidentiality. A message must first be hidden or encrypted in the picture media to ensure its security and confidentiality. …”
Get full text
Get full text
Get full text
Article -
16
A study on one way hashing function and its application for FTMSK webmail / Mohd Rosli Mohd Daud
Published 2007Get full text
Get full text
Research Reports -
17
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…The performance proposed encryption algorithm was promising which could be a starting point for detailed analysis and implementation in real application domains.…”
Get full text
Get full text
Get full text
Article -
18
-
19
Security analysis of data transmission in an IoT based platform for telemedicine
Published 2021“…This study proposes a modified folded pipeline architecture for resource restriction applications with an AES algorithm. …”
Get full text
Get full text
Get full text
Article -
20
Automatic marking system for programming subject
Published 2023“…This project is a web application designed for lecturer that teaching programming subject to automatically mark programming algorithm exercise. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
