A secure message handler using microsoft cryptoapi
In this project, a message handler with security features is developed using Microsoft CryptoAPI. The source code is written in Visual Basic to take advantage of the extensive graphical features of the language. A Visual Basic module called clsCiyptoAPI was developed to make calls to the advap...
| Main Author: | Eh Kan, Chessda Uttraphan |
|---|---|
| Format: | Thesis |
| Language: | English English English |
| Published: |
2003
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/8153/ http://eprints.uthm.edu.my/8153/1/24p%20CHESSDA%20UTTRAPHAN%20EH%20KAN.pdf http://eprints.uthm.edu.my/8153/2/CHESSDA%20UTTRAPHAN%20EH%20KAN%20COPYRIGHT%20DECLARATION.pdf http://eprints.uthm.edu.my/8153/3/CHESSDA%20UTTRAPHAN%20EH%20KAN%20WATERMARK.pdf |
Similar Items
A secure message handler using microsoft cryptoapi
by: Eh Kan, Chessda Uttraphan
Published: (2003)
by: Eh Kan, Chessda Uttraphan
Published: (2003)
Final examination question generator using microsoft word's macro
by: Hoong, Adrian Yong Weng
Published: (2014)
by: Hoong, Adrian Yong Weng
Published: (2014)
Active gaming using microsoft kinect in solving obesity problem
by: Tan, Vincent Sin Chia
Published: (2014)
by: Tan, Vincent Sin Chia
Published: (2014)
Verification the performance of Microsoft SQL Server / Nageswary Gannapathy
by: Nageswary , Gannapathy
Published: (2002)
by: Nageswary , Gannapathy
Published: (2002)
Web transcript verification using dual check digit as secure number
by: Abd Halim, Muhamad Rais
Published: (2016)
by: Abd Halim, Muhamad Rais
Published: (2016)
The use of Microsoft teams breakout rooms to encourage collaborative learning in synchronous online classroom
by: Nabila, Abdul Malek
Published: (2022)
by: Nabila, Abdul Malek
Published: (2022)
DEVELOPMENT OF CLOUD-BASED MEDIA PLAYER USING MICROSOFT AZURE SERVICES
by: Chong, Fong Kim, et al.
Published: (2018)
by: Chong, Fong Kim, et al.
Published: (2018)
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019)
by: Ali, Mohammed Ahnaf
Published: (2019)
Unified framework for spam detection and risk assessment in short message communication media / Adewole Kayode Sakariyah
by: Adewole Kayode, Sakariyah
Published: (2018)
by: Adewole Kayode, Sakariyah
Published: (2018)
Mobile geo-based bulletin messaging system
by: Lee, Bernard Jian Wen
Published: (2018)
by: Lee, Bernard Jian Wen
Published: (2018)
Securing e-learning environment: A study of security awareness and behavior of user
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
A study of caesar cipher and transposition cipher in jawi messages
by: Mohd Lokman, Syiham, et al.
Published: (2018)
by: Mohd Lokman, Syiham, et al.
Published: (2018)
The influence of user mobility in mobile virus
propagation: An enterprise mobile security
perspective
by: Sudin, Suhizaz, et al.
Published: (2015)
by: Sudin, Suhizaz, et al.
Published: (2015)
A secured data hiding using affine transformation in video steganography
by: Ramalingam, Mritha, et al.
Published: (2020)
by: Ramalingam, Mritha, et al.
Published: (2020)
Adaptable Chinese Language Learning Card Game
by: Wong, Kai Kit, et al.
Published: (2018)
by: Wong, Kai Kit, et al.
Published: (2018)
Securing password authentication using MD5 algorithm
by: Siti Nabilah , Mohammad Zain
Published: (2014)
by: Siti Nabilah , Mohammad Zain
Published: (2014)
A secure audio steganography approach
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
A review on cloud computing security
by: Teo, Marry, et al.
Published: (2018)
by: Teo, Marry, et al.
Published: (2018)
A secure authentication scheme using locimetric and press touch code techniques
by: Noor Elya Afiqah, Che Nordin
Published: (2019)
by: Noor Elya Afiqah, Che Nordin
Published: (2019)
Smart home security
by: Mohammad Syafi Azim, Mohd Razam
Published: (2019)
by: Mohammad Syafi Azim, Mohd Razam
Published: (2019)
Microsoft profit up 79%
Published: (2008)
Published: (2008)
Model driven security frameworks for addressing security problems of Service Oriented Architecture
by: Saleem, M. Q., et al.
Published: (2010)
by: Saleem, M. Q., et al.
Published: (2010)
Inculcating secure coding for beginners
by: A. Aziz, Normaziah, et al.
Published: (2017)
by: A. Aziz, Normaziah, et al.
Published: (2017)
Enhancement of multicast network security
by: Ali, Sellami, et al.
Published: (2013)
by: Ali, Sellami, et al.
Published: (2013)
A New Approach to Secure and Manage Load Balancing of the Distributed Database Using SQL Firewall
by: A., Fairuzullah, et al.
by: A., Fairuzullah, et al.
A review of challenges and security risks of cloud computing
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
Soap performance enhancement for high volume messaging / Ali Baba Dauda
by: Ali Baba , Dauda
Published: (2018)
by: Ali Baba , Dauda
Published: (2018)
A big data prediction framework for weather forecast using MapReduce algorithm
by: Khalid, Adam, et al.
Published: (2017)
by: Khalid, Adam, et al.
Published: (2017)
Android based smart security systems using internet of things (IoT) and firebase
by: Harvent Rau, Mogana Ravu
Published: (2019)
by: Harvent Rau, Mogana Ravu
Published: (2019)
Securing cloud data system (SCDS) for key exposure using AES algorithm
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
Video scene change detection based on histogram analysis for hiding message
by: M., Fuad, et al.
Published: (2021)
by: M., Fuad, et al.
Published: (2021)
Towards designing effective security messages: Persuasive password guidelines
by: Zakaria, Nur Haryani, et al.
Published: (2013)
by: Zakaria, Nur Haryani, et al.
Published: (2013)
Postprocessing algorithm for security features extraction
by: Rozita, Mohd Yusof, et al.
Published: (2012)
by: Rozita, Mohd Yusof, et al.
Published: (2012)
Multibiometric systems and template security survey
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
IPTV network security: threats and countermeasures
by: M. S. A., Noman Ranak, et al.
Published: (2018)
by: M. S. A., Noman Ranak, et al.
Published: (2018)
An object-oriented data automation system for Microsoft Excel files / Ng Lee Yean.
by: Ng, Lee Yean
Published: (2003)
by: Ng, Lee Yean
Published: (2003)
Automated house by using raspberry PI
by: Badri, Shaharudin
Published: (2014)
by: Badri, Shaharudin
Published: (2014)
A dimension-based information security culture model and its relationship with employees’ security behavior: A case study in Malaysian higher educational institutions
by: Akhyari, Nasir, et al.
Published: (2019)
by: Akhyari, Nasir, et al.
Published: (2019)
Blockchain technology for security issues and challenges in IoT
by: Kumar, Nallapaneni Manoj, et al.
Published: (2018)
by: Kumar, Nallapaneni Manoj, et al.
Published: (2018)
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
Similar Items
-
A secure message handler using microsoft cryptoapi
by: Eh Kan, Chessda Uttraphan
Published: (2003) -
Final examination question generator using microsoft word's macro
by: Hoong, Adrian Yong Weng
Published: (2014) -
Active gaming using microsoft kinect in solving obesity problem
by: Tan, Vincent Sin Chia
Published: (2014) -
Verification the performance of Microsoft SQL Server / Nageswary Gannapathy
by: Nageswary , Gannapathy
Published: (2002) -
Web transcript verification using dual check digit as secure number
by: Abd Halim, Muhamad Rais
Published: (2016)