Enhance key generator of data encryption standard (DES)
Also available in printed version: QA76.9.A25 M343 2012 raf
| Main Author: | Mahan Niknafskermani |
|---|---|
| Other Authors: | Norbik Bashah Idris, supervisor |
| Format: | Master's thesis |
| Language: | English |
| Published: |
Universiti Teknologi Malaysia
2025
|
| Subjects: | |
| Online Access: | https://utmik.utm.my/handle/123456789/53678 |
| Abstract | Abstract here |
Similar Items
Flat role based access control and encryption scheme for database security
by: Al Farissi
Published: (2025)
by: Al Farissi
Published: (2025)
Efficiency key generation management in a big organization for symmetric cryptography system
by: Atefeh Mirzaee
Published: (2025)
by: Atefeh Mirzaee
Published: (2025)
Versatile enhanced encryption process (VEEP) for improved security in general purpose embedded device communication
by: Muhammad Farhan Abu Bakar
Published: (2025)
by: Muhammad Farhan Abu Bakar
Published: (2025)
Preventing web defacement using encryption technique
by: Mazuin Nihar Noor Ali
Published: (2025)
by: Mazuin Nihar Noor Ali
Published: (2025)
An index based searchable encryption scheme with IND-CCA security
by: Majid Nateghizad
Published: (2025)
by: Majid Nateghizad
Published: (2025)
Optimize perceptuality of digital image from encryption based on quadtree
by: Hussein A. Hussein
Published: (2025)
by: Hussein A. Hussein
Published: (2025)
E-mail encryption framework for Malaysian public sector
by: Rohayu A. Wahid
Published: (2025)
by: Rohayu A. Wahid
Published: (2025)
Analyzing the effectiveness of information security practices in implementing ISMS standard
by: Rohaida Ismail
Published: (2025)
by: Rohaida Ismail
Published: (2025)
Implementation of PKCS11 and PKCS12 cryptographic functions in.net for scan associates
by: Pirooz Kiani Kori
Published: (2025)
by: Pirooz Kiani Kori
Published: (2025)
Encryption and decryption for JPEG - Lossless, targa & bitmap image file format using blowfish & SEF algorithm
by: Then, Siaw Cheik
Published: (2025)
by: Then, Siaw Cheik
Published: (2025)
Data privacy comparison using advanced encryption standard (AES) and data encryption standard (DES) / Hikma Farah Ali
by: Ali, Hikma Farah
Published: (2019)
by: Ali, Hikma Farah
Published: (2019)
Designing lightweight cryptography algorithm for internet of things
by: Mohd. Fairus Mustapha
Published: (2025)
by: Mohd. Fairus Mustapha
Published: (2025)
Standard operating procedure for digital evidence in cyber crime
by: Mohd. Kamarudin Md. Din
Published: (2025)
by: Mohd. Kamarudin Md. Din
Published: (2025)
Information security for employee self service application using AHP model / Yuhasnita Md Yusop
by: Md Yusop, Yuhasnita
Published: (2012)
by: Md Yusop, Yuhasnita
Published: (2012)
Feasibility study on creating secure and memorable password for Gen Y / Nor Zarina Zamri
by: Zamri, Nor Zarina
Published: (2016)
by: Zamri, Nor Zarina
Published: (2016)
Dynamic S-boxes and spiral permutation function on Fibonacci sequence for secure block cipher / Kamsiah Mohamed
by: Mohamed, Kamsiah
Published: (2022)
by: Mohamed, Kamsiah
Published: (2022)
Analyzing pattern matching algorithms applied on snort intrusion detection system
by: Abdifatah Abdirahman Abdullahi
Published: (2025)
by: Abdifatah Abdirahman Abdullahi
Published: (2025)
Enhancing time-stamping techniqe by implementing media access control address
by: Pacu Putra Suarli
Published: (2025)
by: Pacu Putra Suarli
Published: (2025)
Enhancing the security of high payload image steganography using chaos
by: Rezza Moieni
Published: (2025)
by: Rezza Moieni
Published: (2025)
Integration of verification in OTP cryptography for highly critical embedded system
by: Muhammad Maharoff
Published: (2025)
by: Muhammad Maharoff
Published: (2025)
Enhancing the security measures for web based application / Herman Md Tahir
by: Md Tahir, Herman
Published: (2015)
by: Md Tahir, Herman
Published: (2015)
Web-based digital rights management system for the malaysian culture and heritage digital bank project
by: Wan Mohd. Khairi Wan Mohamed
Published: (2025)
by: Wan Mohd. Khairi Wan Mohamed
Published: (2025)
Game based authentication for EDoS framework
by: Asaju Abdulazeez Olamilekan
Published: (2025)
by: Asaju Abdulazeez Olamilekan
Published: (2025)
Dbcrypt user and key management
by: Omar Muse Omar
Published: (2025)
by: Omar Muse Omar
Published: (2025)
Cryptography technique in securing the e-passport authentication system
by: Tham, Yuew Chyi
Published: (2025)
by: Tham, Yuew Chyi
Published: (2025)
Enhancement of network access control architecture with virtualization
by: Hairil Annuar Md Salleh
Published: (2025)
by: Hairil Annuar Md Salleh
Published: (2025)
Tamper detection of qur�anic text watermarking scheme based on vowel letters with Kashida using exclusive-or and queueing technique
by: Ali Abdulraheem Alwan Al-Khafaji Razak
Published: (2025)
by: Ali Abdulraheem Alwan Al-Khafaji Razak
Published: (2025)
The robust steganography technique based on location look-up table (LLUT)
by: Abdulrashid Abba Ali
Published: (2025)
by: Abdulrashid Abba Ali
Published: (2025)
Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar
by: Jaafar, Mohd Izhar
Published: (2012)
by: Jaafar, Mohd Izhar
Published: (2012)
Investigating information revelation on Facebook towards information privacy threats based on user characteristics / Sitinor Megawati Saurani
by: Saurani, Sitinor Megawati
Published: (2015)
by: Saurani, Sitinor Megawati
Published: (2015)
Online certificate injection system
by: Mohd. Nor Haizam Samsun Baharun
Published: (2025)
by: Mohd. Nor Haizam Samsun Baharun
Published: (2025)
Information security behaviours in enhancing awareness
by: Sasan Karami Zadeh
Published: (2025)
by: Sasan Karami Zadeh
Published: (2025)
Kata laluan bergambar
by: Devan Muthusamy
Published: (2025)
by: Devan Muthusamy
Published: (2025)
The encryption - decryption of the column level for a commercial DBMS with supporting user interface
Published: (2025)
Published: (2025)
The encryption - decryption of the column level for a commercial DBMS with supporting user interface
Published: (2025)
Published: (2025)
A security awareness model of data leakage prevention in private sector
by: Ain'natul Mardhiah Mohamad Hasbullah
Published: (2025)
by: Ain'natul Mardhiah Mohamad Hasbullah
Published: (2025)
Factors influencing data leakage behaviour in Malaysian armed forces
by: Wan Adibah Hanis Wan Aziz
Published: (2025)
by: Wan Adibah Hanis Wan Aziz
Published: (2025)
Perisian keselamatan data menggunakan gabungan teknik penyulitan data dan teknik pemampatan data
by: Norfadzila Mohd. Yusof
Published: (2025)
by: Norfadzila Mohd. Yusof
Published: (2025)
Feasibility study on incorporating IEC/ISO27001 information security management system (ISMS) standard in it services environment
by: Hau Lian Hong
Published: (2025)
by: Hau Lian Hong
Published: (2025)
Robust color image watermarking using discrete wavelet transform, discrete cosine transform and cat face transform
by: Amir Hesam Yaribakht Razak
Published: (2025)
by: Amir Hesam Yaribakht Razak
Published: (2025)
Similar Items
-
Flat role based access control and encryption scheme for database security
by: Al Farissi
Published: (2025) -
Efficiency key generation management in a big organization for symmetric cryptography system
by: Atefeh Mirzaee
Published: (2025) -
Versatile enhanced encryption process (VEEP) for improved security in general purpose embedded device communication
by: Muhammad Farhan Abu Bakar
Published: (2025) -
Preventing web defacement using encryption technique
by: Mazuin Nihar Noor Ali
Published: (2025) -
An index based searchable encryption scheme with IND-CCA security
by: Majid Nateghizad
Published: (2025)