Search Results - (( code application _ algorithm ) OR ( its application ((rsa algorithm) OR (new algorithm)) ))*

Refine Results
  1. 1

    A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim by Kamaruddin, Nurul Azwa, Mustakim, Nurul Ain

    Published 2012
    “…Cryptography is the science of hiding information and its applications include ATM cards, computer passwords and electronic commerce in this modern world. …”
    Get full text
    Get full text
    Research Reports
  2. 2

    New Fast Block Matching Algorithm Using New Hybrid Search Pattern And Strategy To Improve Motion Estimation Process In Video Coding Technique by Hamid, Nurul 'Atiqah

    Published 2016
    “…Up until today, video compression algorithm has been applied in various video applications ranging from video conferencing to video telephony. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5
  6. 6

    Automatic marking system for programming subject by Chan, Jin Yee

    Published 2023
    “…This project create an web application to automatically execution code submitted by student and mark the code according to its correctness. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7
  8. 8
  9. 9

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code by Badawi, Bakri

    Published 2022
    “…A new colour QR code algorithm known as a Fuzzy QR code (FQR code) was proposed to solve the problems faced by current colour QR codes. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Optimizing lossless compression by normalized data length in Huffman Algorithm by Tonny, Hidayat

    Published 2022
    “…The proposed new algorithm has more optimal CR than the various variants of the Huffman-based lossless application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing by Goh, Kwang Yi

    Published 2023
    “…We utilized the enhanced Q-Learning algorithm to compare actions, including context-based actions, to effectively achieve higher code coverage. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Privacy in medical emergency system: cryptographic and security aspects by Hameed, Shihab A., Yuchoch, Habib, Al-Khateeb, Wajdi Fawzi Mohammed

    Published 2010
    “…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Efficient DNS based Load Balancing for Bursty Web Application Traffic by Chin, Mei Lu, Chong, Eng Tan, Mohamad Imran, Bin Bandan

    Published 2012
    “…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20