Implementation of hashed cryptography algorithm based on cryptography message syntax
This design and simulation research is conducted in CMC network security (message encryption context). The design will use MATLAB encryption to show simulation. The coding is designed in such a way that there is a malicious attack to destroy the data. The system will automatically protect data and t...
| Main Author: | Ali, Mohammed Ahnaf |
|---|---|
| Format: | Thesis |
| Language: | English English English |
| Published: |
2019
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/562/ |
| Abstract | Abstract here |
Similar Items
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
by: Hasnira, Md. Lazim
Published: (2004)
by: Hasnira, Md. Lazim
Published: (2004)
Visual Cryptography for E-Voting by Using Fingerprint Technique
by: Ghayab, Hadi Ratham
Published: (2010)
by: Ghayab, Hadi Ratham
Published: (2010)
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
by: Shuwandy, Moceheb Lazam
Published: (2012)
by: Shuwandy, Moceheb Lazam
Published: (2012)
Enhanced base point selection algorithm and koblitz message mapping for elliptic curve cryptography
by: Saeid Bakhtiari
Published: (2025)
by: Saeid Bakhtiari
Published: (2025)
Omega network hash construction
by: Chuah, Chai Wen
Published: (2009)
by: Chuah, Chai Wen
Published: (2009)
Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon
by: Lew , Chee Hon
Published: (2017)
by: Lew , Chee Hon
Published: (2017)
Enhancement Of Manchester Encoding Technique By Combining IT With A Hash Function
by: Hamarsheh, Mu'taz M. N.
Published: (2008)
by: Hamarsheh, Mu'taz M. N.
Published: (2008)
New Representation Method For Integers And Its Application On Elliptic Curve Cryptography
by: Eghdamian, Arash
Published: (2020)
by: Eghdamian, Arash
Published: (2020)
A Model for Evaluation of Cryptography Algorithm on UUM Portal
by: Norliana, Abdul Majid
Published: (2004)
by: Norliana, Abdul Majid
Published: (2004)
Designing lightweight cryptography algorithm for internet of things
by: Mohd. Fairus Mustapha
Published: (2025)
by: Mohd. Fairus Mustapha
Published: (2025)
Chaotification Methods For
Enhancing One-Dimension Digital
Chaotic Maps For Applications In
Cryptography
by: Alawida, Moatsum Khalif Oduh
Published: (2020)
by: Alawida, Moatsum Khalif Oduh
Published: (2020)
Chaotification Methods For
Enhancing One-Dimension Digital
Chaotic Maps For Applications In
Cryptography
by: Alawida, Moatsum Khalif Oduh
Published: (2022)
by: Alawida, Moatsum Khalif Oduh
Published: (2022)
Hybrid cryptography algorithm to improve security cloud storage
by: Abd Almohsen, Inam Razzaq
Published: (2017)
by: Abd Almohsen, Inam Razzaq
Published: (2017)
Zot-Binary: A New Number System And Its Application On Number Theory Based Public-Key Cryptography
by: Jahani, Shahram
Published: (2016)
by: Jahani, Shahram
Published: (2016)
Implementing RC5 Encrtption Algorithm On a Web Based Medical Cosultation System
by: Khashan, Osama Ahmed Abdelhadi
Published: (2007)
by: Khashan, Osama Ahmed Abdelhadi
Published: (2007)
A secure message handler using microsoft cryptoapi
by: Eh Kan, Chessda Uttraphan
Published: (2003)
by: Eh Kan, Chessda Uttraphan
Published: (2003)
Optimal cryptography algorithms for encryption as a service on cloud environments
by: Rahmani Hossein (P53657)
Published: (2023)
by: Rahmani Hossein (P53657)
Published: (2023)
Unified framework for spam detection and risk assessment in short message communication media / Adewole Kayode Sakariyah
by: Adewole Kayode, Sakariyah
Published: (2018)
by: Adewole Kayode, Sakariyah
Published: (2018)
Optimization grid scheduling with priority base and bees algorithm
by: Ahmed, Mohammed Shihab
Published: (2014)
by: Ahmed, Mohammed Shihab
Published: (2014)
Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid
by: Yazid, Mariam Azwa
Published: (2015)
by: Yazid, Mariam Azwa
Published: (2015)
Soap performance enhancement for high volume messaging / Ali Baba Dauda
by: Ali Baba , Dauda
Published: (2018)
by: Ali Baba , Dauda
Published: (2018)
Cryptography technique in securing the e-passport authentication system
by: Tham, Yuew Chyi
Published: (2025)
by: Tham, Yuew Chyi
Published: (2025)
Extention and cryptanalysis of golden cryptography
by: Sharabyan, Mohammad Tahghighi
Published: (2015)
by: Sharabyan, Mohammad Tahghighi
Published: (2015)
Sequence and sequence-less t-way test suite generation strategy based on the elitist flower pollination algorithm
by: Mohammed Abdullah, Abdullah Nasser
Published: (2018)
by: Mohammed Abdullah, Abdullah Nasser
Published: (2018)
Designing substitution boxes based on chaotic map and globalized firefly algorithm
by: Ahmed, Hussam Alddin Shihab
Published: (2019)
by: Ahmed, Hussam Alddin Shihab
Published: (2019)
PMT : opposition based learning technique for enhancing metaheuristic algorithms performance
by: Hammoudeh, S. Alamri
Published: (2020)
by: Hammoudeh, S. Alamri
Published: (2020)
Performance Comparison of Parallel Bees Algorithm on Rosenbrock Function
by: Hammash, Nayif Mohammed
Published: (2012)
by: Hammash, Nayif Mohammed
Published: (2012)
Improved cuckoo search based neural network learning algorithms for data classification
by: Abdullah, Abdullah
Published: (2014)
by: Abdullah, Abdullah
Published: (2014)
Join query enhancement processing (jqpro) with big rdf data on a distributed system using hashing-merge join technique
by: Nahla Mohammedelzein, Elawad Babiker
Published: (2021)
by: Nahla Mohammedelzein, Elawad Babiker
Published: (2021)
Integration of verification in OTP cryptography for highly critical embedded system
by: Muhammad Maharoff
Published: (2025)
by: Muhammad Maharoff
Published: (2025)
Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff
by: Fatin Nabila , Abd Latiff
Published: (2021)
by: Fatin Nabila , Abd Latiff
Published: (2021)
Artificial immune system based on real valued negative selection algorithms for anomaly detection
by: Khairi, Rihab Salah
Published: (2015)
by: Khairi, Rihab Salah
Published: (2015)
Elitist hybrid migrating birds optimization and genetic algorithm based strategy for T-way test suite generation
by: Hasneeza Liza, Zakaria
Published: (2020)
by: Hasneeza Liza, Zakaria
Published: (2020)
An improved public key cryptography based on the elliptic curve
by: Al-Daoud, Essam Faleh
Published: (2002)
by: Al-Daoud, Essam Faleh
Published: (2002)
Securing cloud data system (SCDS) for key exposure using AES algorithm
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
Designing and Implementing Research Supervision System for Awang Had Saleh Graduate School of Arts and Sciences (AHSGS)
by: Greag, Mohammed Y.M.
Published: (2012)
by: Greag, Mohammed Y.M.
Published: (2012)
Compressing Images Using Multi-Level Wavelet Transform Algorithm (MWTA)
by: Odeh, Ali Ahmad Alabd Abu
Published: (2012)
by: Odeh, Ali Ahmad Alabd Abu
Published: (2012)
Improvement of fuzzy neural network using mine blast algorithm for classification of Malaysian Small Medium Enterprises based on strength
by: Hussain Talpur, Kashif
Published: (2015)
by: Hussain Talpur, Kashif
Published: (2015)
An experimental study of neighbourhood based metaheuristic algorithms for test case generation satisfying the modified condition / decision coverage criterion
by: Haque, Ariful
Published: (2018)
by: Haque, Ariful
Published: (2018)
Improving The Algorithm To Detect Internet Worms
by: Rasheed, Mohmmad M
Published: (2008)
by: Rasheed, Mohmmad M
Published: (2008)
Similar Items
-
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
by: Hasnira, Md. Lazim
Published: (2004) -
Visual Cryptography for E-Voting by Using Fingerprint Technique
by: Ghayab, Hadi Ratham
Published: (2010) -
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
by: Shuwandy, Moceheb Lazam
Published: (2012) -
Enhanced base point selection algorithm and koblitz message mapping for elliptic curve cryptography
by: Saeid Bakhtiari
Published: (2025) -
Omega network hash construction
by: Chuah, Chai Wen
Published: (2009)