A Model for Evaluation of Cryptography Algorithm on UUM Portal
The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. The development of the simulation model consists of seven steps. The steps are problem definition,...
| Main Author: | Norliana, Abdul Majid |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2004
|
| Subjects: | |
| Online Access: | https://etd.uum.edu.my/1393/1/NORLIANA_ABDUL_MAJID.pdf https://etd.uum.edu.my/1393/2/1.NORLIANA_ABDUL_MAJID.pdf https://etd.uum.edu.my/1393/ |
| Abstract | Abstract here |
Similar Items
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019)
by: Ali, Mohammed Ahnaf
Published: (2019)
Evaluating User Acceptance of Sistem Keselamatan in UUM Portal
by: Siti Nurul Azwani, Abdul Rahman
Published: (2005)
by: Siti Nurul Azwani, Abdul Rahman
Published: (2005)
Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff
by: Fatin Nabila , Abd Latiff
Published: (2021)
by: Fatin Nabila , Abd Latiff
Published: (2021)
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
by: Kadhim, Al Karawi Hayder Natiq
Published: (2019)
by: Kadhim, Al Karawi Hayder Natiq
Published: (2019)
Performance evaluation between Tahoe, Reno and New Reno congestion algorithms / Seow Chen Siong
by: Seow, Chen Siong
Published: (2003)
by: Seow, Chen Siong
Published: (2003)
Extended multiple models selection algorithms based on iterative feasible generalized least squares (IFGLS) and expectation-maximization (EM) algorithm
by: Nur Azulia, Kamarudin
Published: (2019)
by: Nur Azulia, Kamarudin
Published: (2019)
Model giliran prestasi bagi pelayan portal UUM
by: Khairiny, Khalid
Published: (2007)
by: Khairiny, Khalid
Published: (2007)
Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid
by: Yazid, Mariam Azwa
Published: (2015)
by: Yazid, Mariam Azwa
Published: (2015)
Designing lightweight cryptography algorithm for internet of things
by: Mohd. Fairus Mustapha
Published: (2025)
by: Mohd. Fairus Mustapha
Published: (2025)
An enhanced computational model based on social spider optimisation algorithm for EEG- based emotion recognition
by: Al-Qammaz, Abdullah Yousef Awwad
Published: (2019)
by: Al-Qammaz, Abdullah Yousef Awwad
Published: (2019)
A novel deadlock detection algorithm for neighbour replication on grid environment
by: Noriyani, Mohd Zin
Published: (2012)
by: Noriyani, Mohd Zin
Published: (2012)
Optimal cryptography algorithms for encryption as a service on cloud environments
by: Rahmani Hossein (P53657)
Published: (2023)
by: Rahmani Hossein (P53657)
Published: (2023)
Web usage mining for UUM learning care using association rules
by: Ramli, Azizul Azhar
Published: (2004)
by: Ramli, Azizul Azhar
Published: (2004)
Web usage mining for UUM learning care using association rules
by: Ramli, Azizul Azhar
Published: (2004)
by: Ramli, Azizul Azhar
Published: (2004)
Visual Cryptography for E-Voting by Using Fingerprint Technique
by: Ghayab, Hadi Ratham
Published: (2010)
by: Ghayab, Hadi Ratham
Published: (2010)
A Portal for Conferences
by: Noor Hazlin, Abdul Rahman
Published: (2005)
by: Noor Hazlin, Abdul Rahman
Published: (2005)
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
by: Mushtaq, Muhammad Faheem
Published: (2019)
by: Mushtaq, Muhammad Faheem
Published: (2019)
A proposed algorithm of random vector in measuring similarity for network topology of Bursa Malaysia
by: Lim, San Yee
Published: (2018)
by: Lim, San Yee
Published: (2018)
Hybrid cryptography algorithm to improve security cloud storage
by: Abd Almohsen, Inam Razzaq
Published: (2017)
by: Abd Almohsen, Inam Razzaq
Published: (2017)
Users' Perception Towards UUM Community Portal
by: Barakat, Bashar Hasan Mohammad
Published: (2009)
by: Barakat, Bashar Hasan Mohammad
Published: (2009)
A multi-objectives genetic algorithm clustering ensembles based approach to summarize relational data
by: Gabriel, Jong Chiye
Published: (2015)
by: Gabriel, Jong Chiye
Published: (2015)
Optimized clustering with modified K-means algorithm
by: Alibuhtto, Mohamed Cassim
Published: (2021)
by: Alibuhtto, Mohamed Cassim
Published: (2021)
Aco-based feature selection algorithm for classification
by: Al-mazini, Hassan Fouad Abbas
Published: (2022)
by: Al-mazini, Hassan Fouad Abbas
Published: (2022)
Development and Evaluation of a Decision Model for DBMS
Selection to Support Enterprise Information Portal (EIP)
by: Ahmad Fadli, Saad
Published: (2006)
by: Ahmad Fadli, Saad
Published: (2006)
The development and evaluation of Mathematical models for the spread of political figure voters with application to presidential elections in Indonesia
by: Benny Yong
Published: (2017)
by: Benny Yong
Published: (2017)
The development and evaluation of Mathematical models for the spread of political figure voters with application to presidential elections in Indonesia
by: Benny Yong
Published: (2017)
by: Benny Yong
Published: (2017)
Image watermarking optimization algorithms in transform domains and feature regions
by: Tao, Hai
Published: (2012)
by: Tao, Hai
Published: (2012)
An adaptive ant colony optimization algorithm for rule-based classification
by: Al-Behadili, Hayder Naser Khraibet
Published: (2020)
by: Al-Behadili, Hayder Naser Khraibet
Published: (2020)
Novel meta-heuristic bald eagle search algorithm for single objective unconstraint functions in global optimization problem
by: Ibrahim, Hassan Abdul Sattar
Published: (2024)
by: Ibrahim, Hassan Abdul Sattar
Published: (2024)
Novel meta-heuristic bald eagle search algorithm for single objective unconstraint functions in global optimization problem
by: Ibrahim, Hassan Abdul Sattar
Published: (2024)
by: Ibrahim, Hassan Abdul Sattar
Published: (2024)
Development of efficient t-way test data generation algorithm and execution strategies
by: Khandakar Fazley, Rabbi
Published: (2012)
by: Khandakar Fazley, Rabbi
Published: (2012)
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
by: Almazini, Hussein
Published: (2022)
by: Almazini, Hussein
Published: (2022)
Enhanced Harris's Hawk algorithm for continuous multi-objective optimization problems
by: Yasear, Shaymah Akram
Published: (2020)
by: Yasear, Shaymah Akram
Published: (2020)
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
by: Shuwandy, Moceheb Lazam
Published: (2012)
by: Shuwandy, Moceheb Lazam
Published: (2012)
Bus Driver Scheduling System via Genetic Algorithm with Enhanced Crossover Mechanism
by: Lim, Tze Shung
Published: (2009)
by: Lim, Tze Shung
Published: (2009)
Evaluating intrusion detection systems in a Unix-based environment / by Mazni Zambri.
by: Mazni, Zambri
Published: (2003)
by: Mazni, Zambri
Published: (2003)
Proper noun detection using regex algorithm and rules for malay named entity recognition
by: Farid Morsidi
Published: (2018)
by: Farid Morsidi
Published: (2018)
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
by: Abdulateef, Alaa Fareed
Published: (2023)
by: Abdulateef, Alaa Fareed
Published: (2023)
Multi-objective pareto ant colony system based algorithm for generator maintenance scheduling
by: Shimailawi, Shatha Abdulhadi Muthana
Published: (2022)
by: Shimailawi, Shatha Abdulhadi Muthana
Published: (2022)
Proper noun detection using regex algorithm and rules for malay named entity recognition
by: Farid Morsidi
Published: (2018)
by: Farid Morsidi
Published: (2018)
Similar Items
-
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019) -
Evaluating User Acceptance of Sistem Keselamatan in UUM Portal
by: Siti Nurul Azwani, Abdul Rahman
Published: (2005) -
Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff
by: Fatin Nabila , Abd Latiff
Published: (2021) -
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
by: Kadhim, Al Karawi Hayder Natiq
Published: (2019) -
Performance evaluation between Tahoe, Reno and New Reno congestion algorithms / Seow Chen Siong
by: Seow, Chen Siong
Published: (2003)