Developing secure android application with encrypted database file using sqlcipher
The number of smartphone users is increasing every year. The technology changes the large form of personal computer become portable computer called smartphone. Todays the most popular operating system for smartphones is android, it is recorded that more than 1 billion android devices was activated....
| Main Author: | Rachmawan, Ardiansa |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2014
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/14834/ https://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=91014 |
| Abstract | Abstract here |
Similar Items
Test suite reduction in android application using refactoring
by: Ahmed, Maryam Temitayo
Published: (2016)
by: Ahmed, Maryam Temitayo
Published: (2016)
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
by: Hasnira, Md. Lazim
Published: (2004)
by: Hasnira, Md. Lazim
Published: (2004)
Managing File/Data Compression In CD-Based Multimedia Application
by: Suzeela, Baharum
Published: (2001)
by: Suzeela, Baharum
Published: (2001)
Development Of Web Database Application For Research And Consultancy Project Management
by: Norhaiza, Khairudin
Published: (2002)
by: Norhaiza, Khairudin
Published: (2002)
Analysis and modeling of database storage optimization power consumption usage for green data centers
by: Wan Noor Hamiza, Wan Ali
Published: (2014)
by: Wan Noor Hamiza, Wan Ali
Published: (2014)
An efficient multi join query optimization for relational database management system using swarm intelligence approaches
by: Alsaedi, Ahmed Khalaf Zager
Published: (2016)
by: Alsaedi, Ahmed Khalaf Zager
Published: (2016)
An efficient multi join query optimization for relational database management system using swarm intelligence approaches
by: Alsaedi, Ahmed Khalaf Zager
Published: (2016)
by: Alsaedi, Ahmed Khalaf Zager
Published: (2016)
Application of Technology Acceptance Model on Database Normalizer
by: Al-Absi, Ahmed Abdulhakim Ahmed
Published: (2011)
by: Al-Absi, Ahmed Abdulhakim Ahmed
Published: (2011)
Developing Cost And Risk Assessment Tool For Hybrid Approach In Information Security Risk Analysis
by: Mohd Zabawi, Ahmed Yaser
Published: (2019)
by: Mohd Zabawi, Ahmed Yaser
Published: (2019)
Analysis performance of database programming for computation in statistical application
by: Abdul Rahid @ Abdul Rashid, Nurul Najwa
Published: (2015)
by: Abdul Rahid @ Abdul Rashid, Nurul Najwa
Published: (2015)
A secure message handler using microsoft cryptoapi
by: Eh Kan, Chessda Uttraphan
Published: (2003)
by: Eh Kan, Chessda Uttraphan
Published: (2003)
An improved file carver of intertwined jpeg images using X_myKarve
by: Abdullah, Nurul Azma
Published: (2014)
by: Abdullah, Nurul Azma
Published: (2014)
Steganalysis: Detecting Existence of File Types Embedded in Grey Scale Image
by: Amirulikhsan, Zolkafli
Published: (2008)
by: Amirulikhsan, Zolkafli
Published: (2008)
Web transcript verification using dual check digit as secure number
by: Abd Halim, Muhamad Rais
Published: (2016)
by: Abd Halim, Muhamad Rais
Published: (2016)
A Development of Database Driven Inventory Management for Saudi Small Enterprises
by: Yousef, Alqahtani Ebtisam
Published: (2011)
by: Yousef, Alqahtani Ebtisam
Published: (2011)
Automation of Database Normalization Process.
by: Elfaki, Mohamed Ahmed Mohamed
Published: (2007)
by: Elfaki, Mohamed Ahmed Mohamed
Published: (2007)
Secure System Development with UMLSEC : Application to a B2B System
by: Khairul Anwar, Sedek
Published: (2004)
by: Khairul Anwar, Sedek
Published: (2004)
Development of SecureMet: A Tool for Aligning Security Metrics and Organizations Security Objectives
by: Noraini, Mohd Noor
Published: (2011)
by: Noraini, Mohd Noor
Published: (2011)
Implementing Relational Database For Online Ordering Books System
by: Norfiza, Ibrahim
Published: (2002)
by: Norfiza, Ibrahim
Published: (2002)
Attributes sanitization in object-oriented design to improve database structure
by: Saringat, Mohd Zainuri
Published: (2014)
by: Saringat, Mohd Zainuri
Published: (2014)
Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF)
by: Mazlan, Nurul Hidayah
Published: (2019)
by: Mazlan, Nurul Hidayah
Published: (2019)
Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases
by: Hazzaimeh, Yousef Abd-AlMohdi
Published: (2008)
by: Hazzaimeh, Yousef Abd-AlMohdi
Published: (2008)
Persistence framework for multiple legacy databases of patient information systems / Khor Chin Heong.
by: Khor, Chin Heong
Published: (2000)
by: Khor, Chin Heong
Published: (2000)
Dyscreen : cross-platform dyslexia screening test for Malaysian children through hybrid applications
by: Leong, Pui Huang
Published: (2015)
by: Leong, Pui Huang
Published: (2015)
Development of implementation models for Hospital information system (HIS) in Malaysian Public Hospitals
by: Ismail, Nurul Izzatty
Published: (2016)
by: Ismail, Nurul Izzatty
Published: (2016)
Development Of The Readability Index Model For Young Adults With Reading Difficulties In Malay Language
by: Mohamad Hazawawi, Nur Amalina
Published: (2019)
by: Mohamad Hazawawi, Nur Amalina
Published: (2019)
Securing cloud data system (SCDS) for key exposure using AES algorithm
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
A secure HEVC video watermarking scheme for authentication and copyright purposes
by: Elrowayati, Ali Abdulhafid
Published: (2020)
by: Elrowayati, Ali Abdulhafid
Published: (2020)
Data mining in network traffic using fuzzy clustering
by: Mohamad, Shamsul
Published: (2003)
by: Mohamad, Shamsul
Published: (2003)
Production quantity estimation using an improved artificial neural network
by: Dzakiyullah, Raden Nur Rachman
Published: (2015)
by: Dzakiyullah, Raden Nur Rachman
Published: (2015)
Real estate recommender systems using case-base reasoning approach
by: Alrawhani, Ebrahim Mohammed Abdo
Published: (2014)
by: Alrawhani, Ebrahim Mohammed Abdo
Published: (2014)
Android Based Dyslexia Early Screening Test
by: Abu Zarim, Nor Azimah
Published: (2016)
by: Abu Zarim, Nor Azimah
Published: (2016)
Code clone detection using string based tree matching technique
by: Wahid, Norfaradilla
Published: (2008)
by: Wahid, Norfaradilla
Published: (2008)
Web usage mining for UUM learning care using association rules
by: Ramli, Azizul Azhar
Published: (2004)
by: Ramli, Azizul Azhar
Published: (2004)
Web usage mining for UUM learning care using association rules
by: Ramli, Azizul Azhar
Published: (2004)
by: Ramli, Azizul Azhar
Published: (2004)
Cancer patient's record queries using answer on-demand data sharing architecture
by: Aiza Syahida, Zakaria
Published: (2014)
by: Aiza Syahida, Zakaria
Published: (2014)
Small Dataset Learning In Prediction Model Using Box-Whisker Data Transformation
by: Lateh, Masitah bdul
Published: (2020)
by: Lateh, Masitah bdul
Published: (2020)
System performance evaluation through preventive maintenance scenarios using simulation technique
by: lIyana, Abdullah
Published: (2013)
by: lIyana, Abdullah
Published: (2013)
Specification of vertical semantic consistency rules of UML class diagram refinement using logical approach
by: Nuraini Abdulganiyyi, Nuraini
Published: (2014)
by: Nuraini Abdulganiyyi, Nuraini
Published: (2014)
Discovering student learning styles in engineering mathematic at Politeknik Merlimau using neural network techniques
by: Mat Esa, Asmarizan
Published: (2015)
by: Mat Esa, Asmarizan
Published: (2015)
Similar Items
-
Test suite reduction in android application using refactoring
by: Ahmed, Maryam Temitayo
Published: (2016) -
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
by: Hasnira, Md. Lazim
Published: (2004) -
Managing File/Data Compression In CD-Based Multimedia Application
by: Suzeela, Baharum
Published: (2001) -
Development Of Web Database Application For Research And Consultancy Project Management
by: Norhaiza, Khairudin
Published: (2002) -
Analysis and modeling of database storage optimization power consumption usage for green data centers
by: Wan Noor Hamiza, Wan Ali
Published: (2014)