Search Results - (( _ application based algorithm ) OR ( mobile applications security algorithm ))

Refine Results
  1. 1
  2. 2

    Secure mobile AES encryptor (SMAE) by Satia, Anbalagan

    Published 2016
    “…Besides that, the application is developed as a web based application to ensure the application can be accessed using both mobile application as well as web browser. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Encrypted mobile messaging application using 3D-AES block cipher cryptography algorithm / Aida Najihah Mohd Khlubi by Mohd Khlubi, Aida Najihah

    Published 2019
    “…This paper analyzes how information sent through mobile messaging application is being secured. Nowadays, people are more likely to communicate with each other through mobile application. …”
    Get full text
    Get full text
    Student Project
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    A New Mobile Botnet Classification based on Permission and API Calls by Yusof, M, Saudi, MM, Ridzuan, F

    Published 2024
    “…Therefore, this paper presents a new mobile botnet classification based on permission and Application Programming Interface (API) calls in the smartphone. …”
    Proceedings Paper
  10. 10
  11. 11

    Wireless sensor nodes deployment using multi-robot based on improved spanning tree algorithm by Arezoumand, Reza

    Published 2015
    “…Developing an exploration algorithm based on spanning tree is the main contribution. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Enhancing Smart Home Security System with HOG algorithm by Shahrel, Muhammad Aiman Irfan, Mohamed, Raihani, Muhammad, Sufri, Ade, Candra, Zainudin, Muhammad Noorazlan Shah

    Published 2025
    “…The objectives of this study revolve around the integration of various components, including smart locks employing solenoid locking mechanisms, ultrasonic sensors, video surveillance, and mobile application-based access control. The system offers diverse methods for unlocking, encompassing passcodes, face recognition utilizing the HOG (Histogram of Oriented Gradients) algorithm, mobile applications, and physical button switches. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    The child tracker using location awareness / Muhammad Idham Amdan by Amdan, Muhammad Idham

    Published 2017
    “…In this paper, the aim of proposed conceptual smartphone tracker framework is to provide mobile phone security and to locate ability of device in form of mobile application.…”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    Hide information usings cryptography based on android platform / Ahmad Farhan Ahmad Husni by Ahmad Husni, Ahmad Farhan

    Published 2013
    “…This project focuses on steganography and cryptography. This application uses two levels of securities that make the information more secure and bring difficult to unauthorized party get the information. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Advanced Encryption Standard Mobile Application to Improve College Entrance Security in UNIMAS by Azlina, Ahmadi Julaihi, Ping Ping, Tan, Fateen Afeefa, Md Nor

    Published 2022
    “…This proposed system is an Android-based application developed using the Waterfall methodology. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  20. 20

    Mobile agent based multi-layer security framework for cloud data centers by Uddin, Mueen, Memon, Jamshed, Alsaqour, Raed A., Shah, Asadullah, Abdul Rozan, Mohd Zaidi

    Published 2015
    “…Objective:This paper proposes a new mobile agent based cloud security framework comprising four different security and authentication layers to establish the trust relationship between two entities before using cloud services. …”
    Get full text
    Get full text
    Get full text
    Article