A secure message handler using microsoft cryptoapi
In this project, a message handler with security features is developed using Microsoft CryptoAPI. The source code is written in Visual Basic to take advantage of the extensive graphical features of the language. A Visual Basic module called clsCiyptoAPI was developed to make calls to the advap...
| Main Author: | Eh Kan, Chessda Uttraphan |
|---|---|
| Format: | Thesis |
| Language: | English English English |
| Published: |
2003
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/8153/ |
| Abstract | Abstract here |
Similar Items
A secure message handler using microsoft cryptoapi
by: Eh Kan, Chessda Uttraphan
Published: (2003)
by: Eh Kan, Chessda Uttraphan
Published: (2003)
Web transcript verification using dual check digit as secure number
by: Abd Halim, Muhamad Rais
Published: (2016)
by: Abd Halim, Muhamad Rais
Published: (2016)
Developing secure android application with encrypted database file using sqlcipher
by: Rachmawan, Ardiansa
Published: (2014)
by: Rachmawan, Ardiansa
Published: (2014)
Establishing Effective Workflow Interoperability Framework In The Case Of Domino Workflow And Microsoft Exchange 2000 Server
by: Juliana, Wahid
Published: (2002)
by: Juliana, Wahid
Published: (2002)
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019)
by: Ali, Mohammed Ahnaf
Published: (2019)
Developing Cost And Risk Assessment Tool For Hybrid Approach In Information Security Risk Analysis
by: Mohd Zabawi, Ahmed Yaser
Published: (2019)
by: Mohd Zabawi, Ahmed Yaser
Published: (2019)
Unified framework for spam detection and risk assessment in short message communication media / Adewole Kayode Sakariyah
by: Adewole Kayode, Sakariyah
Published: (2018)
by: Adewole Kayode, Sakariyah
Published: (2018)
Development of SecureMet: A Tool for Aligning Security Metrics and Organizations Security Objectives
by: Noraini, Mohd Noor
Published: (2011)
by: Noraini, Mohd Noor
Published: (2011)
Data mining in network traffic using fuzzy clustering
by: Mohamad, Shamsul
Published: (2003)
by: Mohamad, Shamsul
Published: (2003)
Test suite reduction in android application using refactoring
by: Ahmed, Maryam Temitayo
Published: (2016)
by: Ahmed, Maryam Temitayo
Published: (2016)
Production quantity estimation using an improved artificial neural network
by: Dzakiyullah, Raden Nur Rachman
Published: (2015)
by: Dzakiyullah, Raden Nur Rachman
Published: (2015)
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
by: Hasnira, Md. Lazim
Published: (2004)
by: Hasnira, Md. Lazim
Published: (2004)
Securing cloud data system (SCDS) for key exposure using AES algorithm
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
Code clone detection using string based tree matching technique
by: Wahid, Norfaradilla
Published: (2008)
by: Wahid, Norfaradilla
Published: (2008)
Web usage mining for UUM learning care using association rules
by: Ramli, Azizul Azhar
Published: (2004)
by: Ramli, Azizul Azhar
Published: (2004)
Web usage mining for UUM learning care using association rules
by: Ramli, Azizul Azhar
Published: (2004)
by: Ramli, Azizul Azhar
Published: (2004)
Real estate recommender systems using case-base reasoning approach
by: Alrawhani, Ebrahim Mohammed Abdo
Published: (2014)
by: Alrawhani, Ebrahim Mohammed Abdo
Published: (2014)
Small Dataset Learning In Prediction Model Using Box-Whisker Data Transformation
by: Lateh, Masitah bdul
Published: (2020)
by: Lateh, Masitah bdul
Published: (2020)
Cancer patient's record queries using answer on-demand data sharing architecture
by: Aiza Syahida, Zakaria
Published: (2014)
by: Aiza Syahida, Zakaria
Published: (2014)
System performance evaluation through preventive maintenance scenarios using simulation technique
by: lIyana, Abdullah
Published: (2013)
by: lIyana, Abdullah
Published: (2013)
A secure HEVC video watermarking scheme for authentication and copyright purposes
by: Elrowayati, Ali Abdulhafid
Published: (2020)
by: Elrowayati, Ali Abdulhafid
Published: (2020)
Specification of vertical semantic consistency rules of UML class diagram refinement using logical approach
by: Nuraini Abdulganiyyi, Nuraini
Published: (2014)
by: Nuraini Abdulganiyyi, Nuraini
Published: (2014)
Discovering student learning styles in engineering mathematic at Politeknik Merlimau using neural network techniques
by: Mat Esa, Asmarizan
Published: (2015)
by: Mat Esa, Asmarizan
Published: (2015)
An efficient multi join query optimization for relational database management system using swarm intelligence approaches
by: Alsaedi, Ahmed Khalaf Zager
Published: (2016)
by: Alsaedi, Ahmed Khalaf Zager
Published: (2016)
An efficient multi join query optimization for relational database management system using swarm intelligence approaches
by: Alsaedi, Ahmed Khalaf Zager
Published: (2016)
by: Alsaedi, Ahmed Khalaf Zager
Published: (2016)
A hybrid model for discovering significant patterns in data mining
by: Abdullah, Zailani
Published: (2012)
by: Abdullah, Zailani
Published: (2012)
Soap performance enhancement for high volume messaging / Ali Baba Dauda
by: Ali Baba , Dauda
Published: (2018)
by: Ali Baba , Dauda
Published: (2018)
Secure System Development with UMLSEC : Application to a B2B System
by: Khairul Anwar, Sedek
Published: (2004)
by: Khairul Anwar, Sedek
Published: (2004)
A dual-watermarking with DR code against cropping and resizing attack
by: Lau, Wei Khang
Published: (2016)
by: Lau, Wei Khang
Published: (2016)
A model for federated data grid systems based on network core area
by: Mohamad, Zarina
Published: (2013)
by: Mohamad, Zarina
Published: (2013)
Perspective on selected sample on SDL in JAVA-an analysis of a learning module design for pre-evaluation purposes
by: Ibrahim, Zakir Hussain
Published: (2001)
by: Ibrahim, Zakir Hussain
Published: (2001)
A press touch code based secure graphical password scheme for smart devices
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
Evaluation of Information Security Risks of E-Learning Systems: A Case Study on UUM Learning Zone
by: Tan, Wai Beng
Published: (2011)
by: Tan, Wai Beng
Published: (2011)
An investigation of health information system security policies compliance behaviour / Norshima Humaidi
by: Norshima, Humaidi
Published: (2016)
by: Norshima, Humaidi
Published: (2016)
Pemodelan rangkaian Neural Suap Balik bagi meramal harga rumah
by: Ghazali, Rozaida
Published: (2003)
by: Ghazali, Rozaida
Published: (2003)
Design and simulation of variants of koch models for fractal antenna
by: Riaz, Ul Haq
Published: (2011)
by: Riaz, Ul Haq
Published: (2011)
Tamper localization and recovery watermarking schemes for medical images in PACS
by: Liew, Siew Chuin
Published: (2011)
by: Liew, Siew Chuin
Published: (2011)
Development of implementation models for Hospital information system (HIS) in Malaysian Public Hospitals
by: Ismail, Nurul Izzatty
Published: (2016)
by: Ismail, Nurul Izzatty
Published: (2016)
An improved bat algorithm with artificial neural networks for classification problems
by: Rehman Gillani, Syed Muhammad Zubair
Published: (2016)
by: Rehman Gillani, Syed Muhammad Zubair
Published: (2016)
Functional link neural network with modified bee-firefly learning algorithm for classification task
by: Mohmad Hassim, Yana Mazwin
Published: (2016)
by: Mohmad Hassim, Yana Mazwin
Published: (2016)
Similar Items
-
A secure message handler using microsoft cryptoapi
by: Eh Kan, Chessda Uttraphan
Published: (2003) -
Web transcript verification using dual check digit as secure number
by: Abd Halim, Muhamad Rais
Published: (2016) -
Developing secure android application with encrypted database file using sqlcipher
by: Rachmawan, Ardiansa
Published: (2014) -
Establishing Effective Workflow Interoperability Framework In The Case Of Domino Workflow And Microsoft Exchange 2000 Server
by: Juliana, Wahid
Published: (2002) -
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019)
