Implementation of hashed cryptography algorithm based on cryptography message syntax
This design and simulation research is conducted in CMC network security (message encryption context). The design will use MATLAB encryption to show simulation. The coding is designed in such a way that there is a malicious attack to destroy the data. The system will automatically protect data and t...
| Main Author: | Ali, Mohammed Ahnaf |
|---|---|
| Format: | Thesis |
| Language: | English English English |
| Published: |
2019
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/562/ |
| Abstract | Abstract here |
Similar Items
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
by: Hasnira, Md. Lazim
Published: (2004)
by: Hasnira, Md. Lazim
Published: (2004)
Visual Cryptography for E-Voting by Using Fingerprint Technique
by: Ghayab, Hadi Ratham
Published: (2010)
by: Ghayab, Hadi Ratham
Published: (2010)
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
by: Shuwandy, Moceheb Lazam
Published: (2012)
by: Shuwandy, Moceheb Lazam
Published: (2012)
Enhanced base point selection algorithm and koblitz message mapping for elliptic curve cryptography
by: Saeid Bakhtiari
Published: (2025)
by: Saeid Bakhtiari
Published: (2025)
Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon
by: Lew , Chee Hon
Published: (2017)
by: Lew , Chee Hon
Published: (2017)
Omega network hash construction
by: Chuah, Chai Wen
Published: (2009)
by: Chuah, Chai Wen
Published: (2009)
Enhancement Of Manchester Encoding Technique By Combining IT With A Hash Function
by: Hamarsheh, Mu'taz M. N.
Published: (2008)
by: Hamarsheh, Mu'taz M. N.
Published: (2008)
New Representation Method For Integers And Its Application On Elliptic Curve Cryptography
by: Eghdamian, Arash
Published: (2020)
by: Eghdamian, Arash
Published: (2020)
A Model for Evaluation of Cryptography Algorithm on UUM Portal
by: Norliana, Abdul Majid
Published: (2004)
by: Norliana, Abdul Majid
Published: (2004)
Designing lightweight cryptography algorithm for internet of things
by: Mohd. Fairus Mustapha
Published: (2025)
by: Mohd. Fairus Mustapha
Published: (2025)
Chaotification Methods For
Enhancing One-Dimension Digital
Chaotic Maps For Applications In
Cryptography
by: Alawida, Moatsum Khalif Oduh
Published: (2020)
by: Alawida, Moatsum Khalif Oduh
Published: (2020)
Chaotification Methods For
Enhancing One-Dimension Digital
Chaotic Maps For Applications In
Cryptography
by: Alawida, Moatsum Khalif Oduh
Published: (2022)
by: Alawida, Moatsum Khalif Oduh
Published: (2022)
Hybrid cryptography algorithm to improve security cloud storage
by: Abd Almohsen, Inam Razzaq
Published: (2017)
by: Abd Almohsen, Inam Razzaq
Published: (2017)
Zot-Binary: A New Number System And Its Application On Number Theory Based Public-Key Cryptography
by: Jahani, Shahram
Published: (2016)
by: Jahani, Shahram
Published: (2016)
Optimal cryptography algorithms for encryption as a service on cloud environments
by: Rahmani Hossein (P53657)
Published: (2023)
by: Rahmani Hossein (P53657)
Published: (2023)
Implementing RC5 Encrtption Algorithm On a Web Based Medical Cosultation System
by: Khashan, Osama Ahmed Abdelhadi
Published: (2007)
by: Khashan, Osama Ahmed Abdelhadi
Published: (2007)
A secure message handler using microsoft cryptoapi
by: Eh Kan, Chessda Uttraphan
Published: (2003)
by: Eh Kan, Chessda Uttraphan
Published: (2003)
A DNA Based Lightweight Cryptography Framework Integrating ECC and RNN Based Deep Learning for IoT Security
by: Sehrish, Aqeel
Published: (2025)
by: Sehrish, Aqeel
Published: (2025)
Performance evaluation of symmetric cryptography algorithm for database system / Mariam Azwa Yazid
by: Yazid, Mariam Azwa
Published: (2015)
by: Yazid, Mariam Azwa
Published: (2015)
Unified framework for spam detection and risk assessment in short message communication media / Adewole Kayode Sakariyah
by: Adewole Kayode, Sakariyah
Published: (2018)
by: Adewole Kayode, Sakariyah
Published: (2018)
Extention and cryptanalysis of golden cryptography
by: Sharabyan, Mohammad Tahghighi
Published: (2015)
by: Sharabyan, Mohammad Tahghighi
Published: (2015)
Optimization grid scheduling with priority base and bees algorithm
by: Ahmed, Mohammed Shihab
Published: (2014)
by: Ahmed, Mohammed Shihab
Published: (2014)
Soap performance enhancement for high volume messaging / Ali Baba Dauda
by: Ali Baba , Dauda
Published: (2018)
by: Ali Baba , Dauda
Published: (2018)
Integration of verification in OTP cryptography for highly critical embedded system
by: Muhammad Maharoff
Published: (2025)
by: Muhammad Maharoff
Published: (2025)
Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff
by: Fatin Nabila , Abd Latiff
Published: (2021)
by: Fatin Nabila , Abd Latiff
Published: (2021)
Sequence and sequence-less t-way test suite generation strategy based on the elitist flower pollination algorithm
by: Mohammed Abdullah, Abdullah Nasser
Published: (2018)
by: Mohammed Abdullah, Abdullah Nasser
Published: (2018)
An improved public key cryptography based on the elliptic curve
by: Al-Daoud, Essam Faleh
Published: (2002)
by: Al-Daoud, Essam Faleh
Published: (2002)
Designing substitution boxes based on chaotic map and globalized firefly algorithm
by: Ahmed, Hussam Alddin Shihab
Published: (2019)
by: Ahmed, Hussam Alddin Shihab
Published: (2019)
PMT : opposition based learning technique for enhancing metaheuristic algorithms performance
by: Hammoudeh, S. Alamri
Published: (2020)
by: Hammoudeh, S. Alamri
Published: (2020)
Performance Comparison of Parallel Bees Algorithm on Rosenbrock Function
by: Hammash, Nayif Mohammed
Published: (2012)
by: Hammash, Nayif Mohammed
Published: (2012)
A novel algorithm : apriori-ant. The combination of apriori algorithm and ants colony optimization algorithm
by: Choo, Ai Ling
Published: (2005)
by: Choo, Ai Ling
Published: (2005)
Improved cuckoo search based neural network learning algorithms for data classification
by: Abdullah, Abdullah
Published: (2014)
by: Abdullah, Abdullah
Published: (2014)
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
Artificial immune system based on real valued negative selection algorithms for anomaly detection
by: Khairi, Rihab Salah
Published: (2015)
by: Khairi, Rihab Salah
Published: (2015)
Join query enhancement processing (jqpro) with big rdf data on a distributed system using hashing-merge join technique
by: Nahla Mohammedelzein, Elawad Babiker
Published: (2021)
by: Nahla Mohammedelzein, Elawad Babiker
Published: (2021)
Efficiency key generation management in a big organization for symmetric cryptography system
by: Atefeh Mirzaee
Published: (2025)
by: Atefeh Mirzaee
Published: (2025)
Encrypting text data using elliptic curve cryptography
by: Ali, Abas Abdullahi
Published: (2018)
by: Ali, Abas Abdullahi
Published: (2018)
Quantum Chaotic Cryptography : A New Approach
by: Akhshani, Afshin
Published: (2015)
by: Akhshani, Afshin
Published: (2015)
Enhancing performance of XTS cryptography mode of operation using parallel design
by: Ahmed Alomari, Mohammad
Published: (2009)
by: Ahmed Alomari, Mohammad
Published: (2009)
Enhancement of bluetooth security authentication using Hash-Based Message Authentication Code (HMAC) algorithm
by: Saliou, Diallo Alhassane
Published: (2024)
by: Saliou, Diallo Alhassane
Published: (2024)
Similar Items
-
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
by: Hasnira, Md. Lazim
Published: (2004) -
Visual Cryptography for E-Voting by Using Fingerprint Technique
by: Ghayab, Hadi Ratham
Published: (2010) -
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
by: Shuwandy, Moceheb Lazam
Published: (2012) -
Enhanced base point selection algorithm and koblitz message mapping for elliptic curve cryptography
by: Saeid Bakhtiari
Published: (2025) -
Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon
by: Lew , Chee Hon
Published: (2017)
