Data encryption in e-counselling system (DEECS)
Communication has changed dramatically in recent years and many people now use the internet as the central role in their contact with friends, family and work colleagues. This social side to the web has been very successful and already been used at modern country like America. It is almost the expec...
| Main Author: | Athirah Fayyadhah, Othman |
|---|---|
| Format: | Undergraduates Project Papers |
| Language: | English |
| Published: |
2009
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/1132/ http://umpir.ump.edu.my/id/eprint/1132/1/11.DATA%20ENCRYPTION%20IN%20E-COUNSELLING%20SYSTEM.pdf |
Similar Items
An improved chaotic image encryption algorithm
by: Al-Khasawneh, Mahmoud Ahmad, et al.
Published: (2018)
by: Al-Khasawneh, Mahmoud Ahmad, et al.
Published: (2018)
The performance of the 3DES and fernet encryption in securing data files
by: Siti Munirah, Mohd, et al.
Published: (2024)
by: Siti Munirah, Mohd, et al.
Published: (2024)
Data hiding in medical images using encryption and steganography techniques
by: Nur Athirah, Abdul Razak
Published: (2019)
by: Nur Athirah, Abdul Razak
Published: (2019)
Secure text transfer via bluetooth using hybrid encryption
by: Fakhrul Hakimi, Saidi
Published: (2012)
by: Fakhrul Hakimi, Saidi
Published: (2012)
Implementation of hybrid encryption method using caesar cipher algorithm
by: Charomie, Tat Wi
Published: (2010)
by: Charomie, Tat Wi
Published: (2010)
Implementation of hybrid encryption method using caesar cipher algorithm
by: Tat Wi, Charomie
Published: (2010)
by: Tat Wi, Charomie
Published: (2010)
The hybrid cubes encryption algorithm (HiSea)
by: Jamel, Sapi’ee
Published: (2012)
by: Jamel, Sapi’ee
Published: (2012)
Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms
by: -, Salma, et al.
Published: (2019)
by: -, Salma, et al.
Published: (2019)
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
by: Norrozila, Sulaiman, et al.
Published: (2013)
by: Norrozila, Sulaiman, et al.
Published: (2013)
A New Image-Database Encryption Based on A Hybrid Approach of Data-at-Rest and Data-in-Motion Encryption Protocol.
by: Ooi, Bee Sien, et al.
Published: (2004)
by: Ooi, Bee Sien, et al.
Published: (2004)
Developing e-counselling system
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2015)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2015)
Data Integrity For Cloud Computing With Homomorphic Encryption
by: Awadallah, Ruba N S
Published: (2022)
by: Awadallah, Ruba N S
Published: (2022)
Model of relationship between e-counselling skills, e-counselling ethics and e-counselling limitations with counselling self-efficacy
by: Zainudin, Zaida Nor, et al.
Published: (2022)
by: Zainudin, Zaida Nor, et al.
Published: (2022)
Data transmission using aes encryption via email and sms
by: Arif Hanafi, Sharif Katullah
Published: (2013)
by: Arif Hanafi, Sharif Katullah
Published: (2013)
Implementation of Identity Based Encryption in e-Voting System
by: Selamat, S. R., et al.
Published: (2007)
by: Selamat, S. R., et al.
Published: (2007)
E-thesis management system
by: Nursyazwa, Sadri
Published: (2011)
by: Nursyazwa, Sadri
Published: (2011)
E-system for education company
by: Khoh, Huey Hun
Published: (2011)
by: Khoh, Huey Hun
Published: (2011)
Data Encryption Standard (DES)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
E-meeting system using JSP
by: Nik Masdiana, Nik Mohamed
Published: (2005)
by: Nik Masdiana, Nik Mohamed
Published: (2005)
e-Vehicle booking system at UMP
by: Najihah, Yaakob
Published: (2011)
by: Najihah, Yaakob
Published: (2011)
Encryption using FPGA
by: Nor Robaini, Ibrahim
Published: (2008)
by: Nor Robaini, Ibrahim
Published: (2008)
Reputation system for an e-commerce system using fuzzy logic
by: Zeon Poee, Liang
Published: (2012)
by: Zeon Poee, Liang
Published: (2012)
IoT data encryption algorithm for security
by: Kanaan Ismael, Marwan
Published: (2020)
by: Kanaan Ismael, Marwan
Published: (2020)
Analyzing and Enhancing Data Management for the E-Library Transaction System
by: Marlindawati, ., et al.
Published: (2024)
by: Marlindawati, ., et al.
Published: (2024)
E-ECLAB inventory system for FKP ( software development )
by: Nursyafinaz, Jaafar
Published: (2013)
by: Nursyafinaz, Jaafar
Published: (2013)
E – prestasi pensyarah (lecturer performance evaluation system)
by: Ahmad Khaidir, Hamzah
Published: (2013)
by: Ahmad Khaidir, Hamzah
Published: (2013)
Network based E-learning system for secondary school
by: Choong Hooi, Goh
Published: (2011)
by: Choong Hooi, Goh
Published: (2011)
Increasing data anonymity using privacy techniques and advanced encryption standard
by: Thamer, Khalil Esmeel
Published: (2020)
by: Thamer, Khalil Esmeel
Published: (2020)
Thermal noise generator and injector circuit for data encryption
by: Khan, Sheroz, et al.
Published: (2010)
by: Khan, Sheroz, et al.
Published: (2010)
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
by: Lim, Mui Liang
Published: (2006)
by: Lim, Mui Liang
Published: (2006)
The mediating role of e-counselling skills on the relationship between e-counseling ethics and limitations with counselling self-efficacy among e-counsellors in Malaysia
by: Nor Zainudin, Zaida, et al.
Published: (2023)
by: Nor Zainudin, Zaida, et al.
Published: (2023)
Influence of e-counseling skills on counseling self-efficacy among e-counselors in Malaysia
by: Zainudin, Zaida Nor, et al.
Published: (2022)
by: Zainudin, Zaida Nor, et al.
Published: (2022)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
Chaotic asymmetric encryption process for data security.
by: Kamel Arrifin, Muhammad Rezal, et al.
Published: (2008)
by: Kamel Arrifin, Muhammad Rezal, et al.
Published: (2008)
Text messaging encryption system
by: Sundara Morthty, Nirmala Devi
Published: (2012)
by: Sundara Morthty, Nirmala Devi
Published: (2012)
Potential Data Collections Methods for System Dynamics Modelling: A Brief Overview
by: Aisyah, Ibrahim, et al.
Published: (2021)
by: Aisyah, Ibrahim, et al.
Published: (2021)
Multimedia encryption, transmission and authentication
Published: (2011)
Published: (2011)
An object-oriented data automation system for Microsoft Excel files / Ng Lee Yean.
by: Ng, Lee Yean
Published: (2003)
by: Ng, Lee Yean
Published: (2003)
Disaster recovery planning : local and remote data backup system / Low Chin Seng.
by: Low, Chin Seng
Published: (2000)
by: Low, Chin Seng
Published: (2000)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
Similar Items
-
An improved chaotic image encryption algorithm
by: Al-Khasawneh, Mahmoud Ahmad, et al.
Published: (2018) -
The performance of the 3DES and fernet encryption in securing data files
by: Siti Munirah, Mohd, et al.
Published: (2024) -
Data hiding in medical images using encryption and steganography techniques
by: Nur Athirah, Abdul Razak
Published: (2019) -
Secure text transfer via bluetooth using hybrid encryption
by: Fakhrul Hakimi, Saidi
Published: (2012) -
Implementation of hybrid encryption method using caesar cipher algorithm
by: Charomie, Tat Wi
Published: (2010)