Secure text transfer via bluetooth using hybrid encryption
Secure Text Transfer via Bluetooth Using Hybrid Encryption is a system to secure the text before it transfer via Bluetooth. This system helps the user to secure their text using hybrid encryption. Hybrid encryption will make the text become more secure because it uses the combination of two encrypti...
| Main Author: | Fakhrul Hakimi, Saidi |
|---|---|
| Format: | Undergraduates Project Papers |
| Language: | English |
| Published: |
2012
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/7020/ http://umpir.ump.edu.my/id/eprint/7020/1/Secure%20text%20transfer%20via%20bluetooth%20using%20hybrid%20encryption.pdf |
Similar Items
Implementation of hybrid encryption method using caesar cipher algorithm
by: Charomie, Tat Wi
Published: (2010)
by: Charomie, Tat Wi
Published: (2010)
Implementation of hybrid encryption method using caesar cipher algorithm
by: Tat Wi, Charomie
Published: (2010)
by: Tat Wi, Charomie
Published: (2010)
Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms
by: -, Salma, et al.
Published: (2019)
by: -, Salma, et al.
Published: (2019)
The hybrid cubes encryption algorithm (HiSea)
by: Jamel, Sapi’ee
Published: (2012)
by: Jamel, Sapi’ee
Published: (2012)
The performance of the 3DES and fernet encryption in securing data files
by: Siti Munirah, Mohd, et al.
Published: (2024)
by: Siti Munirah, Mohd, et al.
Published: (2024)
An improved chaotic image encryption algorithm
by: Al-Khasawneh, Mahmoud Ahmad, et al.
Published: (2018)
by: Al-Khasawneh, Mahmoud Ahmad, et al.
Published: (2018)
Mobile car alarm via bluetooth application
by: Norsyafiqah, Jamaluddin
Published: (2015)
by: Norsyafiqah, Jamaluddin
Published: (2015)
Data encryption in e-counselling system (DEECS)
by: Athirah Fayyadhah, Othman
Published: (2009)
by: Athirah Fayyadhah, Othman
Published: (2009)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
Text messaging encryption system
by: Sundara Morthty, Nirmala Devi
Published: (2012)
by: Sundara Morthty, Nirmala Devi
Published: (2012)
Car monitoring using bluetooth security system
by: Fairuz Rizal, Mohamad Rashidi, et al.
Published: (2011)
by: Fairuz Rizal, Mohamad Rashidi, et al.
Published: (2011)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
Bluetooth-triggered alarm security system
by: Muhammad Fadhil, Abdul Malek
Published: (2010)
by: Muhammad Fadhil, Abdul Malek
Published: (2010)
IoT based bluetooth smart radar door system via mobile apps / Mohamad Yusri Ishak
by: Ishak, Mohamad Yusri
Published: (2019)
by: Ishak, Mohamad Yusri
Published: (2019)
Encrypting text data using elliptic curve cryptography
by: Ali, Abas Abdullahi
Published: (2018)
by: Ali, Abas Abdullahi
Published: (2018)
Data transmission using aes encryption via email and sms
by: Arif Hanafi, Sharif Katullah
Published: (2013)
by: Arif Hanafi, Sharif Katullah
Published: (2013)
A secure authentication scheme for bluetooth connection
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
Security in robot operating system (ROS) by using Advanced Encryption Standard (AES)
by: Nor Alia Syuhada, Shaharudin
Published: (2018)
by: Nor Alia Syuhada, Shaharudin
Published: (2018)
A simple way to improve the security of Bluetooth devices
by: Dell, Peter, et al.
Published: (2008)
by: Dell, Peter, et al.
Published: (2008)
Randomized text encryption: a new dimension in cryptography
by: Memon, Jamshed, et al.
Published: (2014)
by: Memon, Jamshed, et al.
Published: (2014)
Encryption using FPGA
by: Nor Robaini, Ibrahim
Published: (2008)
by: Nor Robaini, Ibrahim
Published: (2008)
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
by: Norrozila, Sulaiman, et al.
Published: (2013)
by: Norrozila, Sulaiman, et al.
Published: (2013)
On the security defects of an image encryption scheme
by: C., Li, et al.
Published: (2009)
by: C., Li, et al.
Published: (2009)
Encryption method for SCADA security enhancement
by: Shahzad, Aamir, et al.
Published: (2014)
by: Shahzad, Aamir, et al.
Published: (2014)
Security Study and Encryption / Decryption Method
by: Al-Qdah, Majdi Taysir
Published: (2000)
by: Al-Qdah, Majdi Taysir
Published: (2000)
IoT data encryption algorithm for security
by: Kanaan Ismael, Marwan
Published: (2020)
by: Kanaan Ismael, Marwan
Published: (2020)
Digital Notice Board using Bluetooth and Arduino
by: Rajeshwari, S., et al.
Published: (2024)
by: Rajeshwari, S., et al.
Published: (2024)
Flow and Heat Transfer of Williamson Hybrid Ferrofluid with Combined Convective Transport
by: Mokhtar, Masyfu’ah, et al.
Published: (2023)
by: Mokhtar, Masyfu’ah, et al.
Published: (2023)
Hybrid spline collocation method for transient heat transfer in genrating fin.
by: Amri Ramli, Ahmad Lutfi
Published: (2016)
by: Amri Ramli, Ahmad Lutfi
Published: (2016)
A new secure storing system for biometric templates based encryption and concealment
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
Is Perth a secure place: a Western Australian field study of Bluetooth security
by: Ghori, Khwaja Shan-ul-Hasan Dell, Peter
Published: (2007)
by: Ghori, Khwaja Shan-ul-Hasan Dell, Peter
Published: (2007)
HARC-New Hybrid Method with Hierarchical Attention Based Bidirectional Recurrent Neural Network with Dilated Convolutional Neural Network to Recognize Multilabel Emotions from Text
by: Islam, Md Shofiqul, et al.
Published: (2021)
by: Islam, Md Shofiqul, et al.
Published: (2021)
Solving the vehicle routing problem with stochastic demands via hybrid genetic algorithm-tabu search
by: Ismail, Zuhaimy, et al.
Published: (2008)
by: Ismail, Zuhaimy, et al.
Published: (2008)
Text to braille translator
by: Nurafni , Herman
Published: (2013)
by: Nurafni , Herman
Published: (2013)
Stability analysis for heat transfer flow in micropolar hybrid nanofluids
by: Nur Hazirah Adilla, Norzawary, et al.
Published: (2023)
by: Nur Hazirah Adilla, Norzawary, et al.
Published: (2023)
An Approach to Secure Data Sharing in the Internet of Things Using Blockchain- Based Proxy Re-Encryption
by: Keshav Kumar, Choudhary, et al.
Published: (2024)
by: Keshav Kumar, Choudhary, et al.
Published: (2024)
Homann Stagnation Point Flow and Heat Transfer of Hybrid Nanofluids Over a Permeable Radially Stretching/Shrinking Sheet
by: Kho, Yap Bing, et al.
Published: (2021)
by: Kho, Yap Bing, et al.
Published: (2021)
Magnetohydrodynamics Ag-Fe3O4-ethylene glycol hybrid nanofluid flow and heat transfer with thermal radiation
by: Kho, Yap Bing, et al.
Published: (2022)
by: Kho, Yap Bing, et al.
Published: (2022)
Chaotic asymmetric encryption process for data security.
by: Kamel Arrifin, Muhammad Rezal, et al.
Published: (2008)
by: Kamel Arrifin, Muhammad Rezal, et al.
Published: (2008)
A New Image-Database Encryption Based on A Hybrid Approach of Data-at-Rest and Data-in-Motion Encryption Protocol.
by: Ooi, Bee Sien, et al.
Published: (2004)
by: Ooi, Bee Sien, et al.
Published: (2004)
Similar Items
-
Implementation of hybrid encryption method using caesar cipher algorithm
by: Charomie, Tat Wi
Published: (2010) -
Implementation of hybrid encryption method using caesar cipher algorithm
by: Tat Wi, Charomie
Published: (2010) -
Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms
by: -, Salma, et al.
Published: (2019) -
The hybrid cubes encryption algorithm (HiSea)
by: Jamel, Sapi’ee
Published: (2012) -
The performance of the 3DES and fernet encryption in securing data files
by: Siti Munirah, Mohd, et al.
Published: (2024)