Search Results - (( _ application need algorithm ) OR ( code application among algorithms ))*
Search alternatives:
- application among »
- application need »
- code application »
- among algorithms »
- need algorithm »
-
1
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Cryptographic hash functions carried out processes such as identity verification, file integrity checking, secure key passing, and source code version control. Among all of the cryptography measures, Secure Hash Algorithm 3 (SHA-3) is the newest and secure cryptographic hash algorithm in the current electronic industry. …”
Get full text
Get full text
Thesis -
2
-
3
A Comparison Study of LDPC and BCH Codes
Published 2006Get full text
Get full text
Final Year Project -
4
-
5
-
6
-
7
-
8
Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri
Published 2021“…The phenomenal growth of e-commerce applications in the World Wide Web requires the need to increase the security of data communications over the Internet, especially for highly sensitive document transfer. …”
Get full text
Get full text
Student Project -
9
Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri
Published 2017“…Visual Studio has been used in order to code the program in C#. In addition, some research has been made through observation as well as referring to the published materials and the existing application of fingerprint and Raspberry Pi. …”
Get full text
Get full text
Thesis -
10
OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA
Published 2004Get full text
Get full text
Final Year Project -
11
Network game (Literati) / Chung Mei Kuen
Published 2003“…By using Java applet, it will give a good interactive response since it does not suffer from the delays or variability of bandwidth associated with network connection. The possible applications of multimedia-networked system are endless, as the demand to support interactive communication among groups of users has increased significantly. …”
Get full text
Get full text
Thesis -
12
-
13
-
14
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
15
The impact of Xiaohongshu as the primary information hub: a case study among utar undergraduates
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
-
17
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Hashed Message Authentication Code (HMAC) is widely used to provide authenticity, while symmetric encryption algorithms provide confidentiality. …”
Get full text
Get full text
Thesis -
18
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
Published 2006Get full text
Get full text
Monograph -
19
-
20
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007Get full text
Get full text
Conference or Workshop Item
