A secure message handler using microsoft cryptoapi
In this project, a message handler with security features is developed using Microsoft CryptoAPI. The source code is written in Visual Basic to take advantage of the extensive graphical features of the language. A Visual Basic module called clsCiyptoAPI was developed to make calls to the advapi32...
| Main Author: | Eh Kan, Chessda Uttraphan |
|---|---|
| Format: | Thesis |
| Language: | English English English |
| Published: |
2003
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/8582/ http://eprints.uthm.edu.my/8582/1/24p%20CHESSDA%20UTTRAPHAN%20EH%20KAN.pdf http://eprints.uthm.edu.my/8582/2/CHESSDA%20UTTRAPHAN%20EH%20KAN%20COPYRIGHT%20DECLARATION.pdf http://eprints.uthm.edu.my/8582/3/CHESSDA%20UTTRAPHAN%20EH%20KAN%20WATERMARK.pdf |
Similar Items
A secure message handler using microsoft cryptoapi
by: Eh Kan, Chessda Uttraphan
Published: (2003)
by: Eh Kan, Chessda Uttraphan
Published: (2003)
An optimized attack tree model for security test case planning and generation
by: Omotunde, Habeeb, et al.
Published: (2018)
by: Omotunde, Habeeb, et al.
Published: (2018)
Layered Security Approach for Mobile Computing
by: Abiodun, Bakare Mustapha
Published: (2011)
by: Abiodun, Bakare Mustapha
Published: (2011)
Data mining in network traffic using fuzzy clustering
by: Mohamad, Shamsul
Published: (2003)
by: Mohamad, Shamsul
Published: (2003)
Examination timetabling using genetic algorithm case study: KUiTTHO
by: Mohd Salikon, Mohd Zaki
Published: (2005)
by: Mohd Salikon, Mohd Zaki
Published: (2005)
Feature selection for traditional Malay musical instrument sound classification using rough set
by: Senan, Norhalina
Published: (2013)
by: Senan, Norhalina
Published: (2013)
Development of egg incubator monitoring system using thingspeak as database
by: Azamir, Irwan Mazwan, et al.
Published: (2021)
by: Azamir, Irwan Mazwan, et al.
Published: (2021)
An improved digital watermarking algorithm using combination of least significant bit (LSB) and inverse bit
by: Abdullah Bamatraf, Abdullah Omar
Published: (2012)
by: Abdullah Bamatraf, Abdullah Omar
Published: (2012)
Flu diagnosis system using jaccard index and rough set approaches
by: Efend, Riswan, et al.
Published: (2018)
by: Efend, Riswan, et al.
Published: (2018)
Incompressible flow simulation using S.I.M.P.L.E method on parallel computer
by: Manshoor, Bukhari
Published: (2005)
by: Manshoor, Bukhari
Published: (2005)
An improved directed random walk framework for cancer classification using gene expression data
by: Seah, Choon Sen
Published: (2020)
by: Seah, Choon Sen
Published: (2020)
Comparative evaluation of two peripheral information systems using motion sickness subjective rating
by: Mustaffa, Norrizal, et al.
Published: (2020)
by: Mustaffa, Norrizal, et al.
Published: (2020)
Developing a hybrid hidden MARKOV model using fusion of ARMA model and artificial neural network for crude oil price forecasting
by: Isah, Nuhu
Published: (2020)
by: Isah, Nuhu
Published: (2020)
Mathematical approach for serving nutritious menu for secondary school student using “delete-reshuffle-reoptimize algorithm”
by: M. Sudin, Azila, et al.
Published: (2017)
by: M. Sudin, Azila, et al.
Published: (2017)
Real-time simulation and control of spatio-temporal cardiac excitation using an analog-digital hybrid circuit model
by: Mahmud, Farhanahani
Published: (2011)
by: Mahmud, Farhanahani
Published: (2011)
The Usefulness and Ease of Use Open Office Automation Software Among the Government Staff
by: Nor Asikin, Ismail
Published: (2005)
by: Nor Asikin, Ismail
Published: (2005)
Emotion Modelling Using Neural Network
by: Lam, Choong Kee
Published: (2005)
by: Lam, Choong Kee
Published: (2005)
Software Architecture Evaluation Using Architecture Tradeoff Analysis Method (ATAM): A Case Study of UUM Learning Zone System
by: Haruna, Mohammed Zaharadden
Published: (2010)
by: Haruna, Mohammed Zaharadden
Published: (2010)
Text Categorization Using Naive Bayes Algorithm
by: Wan Hazimah, Wan Ismail
Published: (2005)
by: Wan Hazimah, Wan Ismail
Published: (2005)
Association Rule Mining Using Market Basket Analysis
by: Nor Fadilah, Tahar @ Yusoff
Published: (2003)
by: Nor Fadilah, Tahar @ Yusoff
Published: (2003)
Diagnosing Affected Organs Using Automated Iridology System
by: Albusaidi, Hilal Nasser
Published: (2009)
by: Albusaidi, Hilal Nasser
Published: (2009)
Analyzing Academic Achievement of CAS's Students Using Data Mining
by: Nor Asiah, Abdul Rahman
Published: (2009)
by: Nor Asiah, Abdul Rahman
Published: (2009)
Forecasting model for extreme rainfall using artificial neural network
by: Al-Qurayshi, Yasir Hilal Hadi
Published: (2015)
by: Al-Qurayshi, Yasir Hilal Hadi
Published: (2015)
Mobile Thalassaemia Diagnosis System Using Case-Based Reasoning
by: Mohammadnor Basri, Shafe
Published: (2005)
by: Mohammadnor Basri, Shafe
Published: (2005)
Uncovering Hidden Information within UUM Students' Data Using OLAP
by: Nur Hani, Zulkifli Abai
Published: (2010)
by: Nur Hani, Zulkifli Abai
Published: (2010)
Continuance intention to use electronic collection system in Nigerian federal hospitals
by: Kabir, Muhammad Auwal
Published: (2017)
by: Kabir, Muhammad Auwal
Published: (2017)
Intelligent School Computer Laboratory Reservation System by Using Multiple Agents Based
by: Sulaiman, Mahzan
Published: (2009)
by: Sulaiman, Mahzan
Published: (2009)
Predicting Employment Condition of TARC'S ICT Graduates Using Backpropagation Neural Network
by: Tay, Shu Shiang
Published: (2009)
by: Tay, Shu Shiang
Published: (2009)
Angle Based Protein Tertiary Structure Prediction Using Bees Optimization Algorithm
by: Al-Qattan, Zakaria Noor Aldeen Mahmood
Published: (2010)
by: Al-Qattan, Zakaria Noor Aldeen Mahmood
Published: (2010)
Reduce energy consumption in the wireless sensor network by using EEL-MAC protocol
by: Jawad, Moheimen Mohomed Jleil
Published: (2015)
by: Jawad, Moheimen Mohomed Jleil
Published: (2015)
A study of watermarking methods in medical application
by: Ng, Lee Ping
Published: (2004)
by: Ng, Lee Ping
Published: (2004)
Automatic Operation Control System Using PLC Application in Production Line of Abo-Sleem's Factory
by: Abdussalam, Hussin Al Elwani
Published: (2009)
by: Abdussalam, Hussin Al Elwani
Published: (2009)
SQL-Injection Vulnerability Scanner Using Automatic Creation of SQL-Injection Attacks (MySqlinjector)
by: Shakhatreh, Ala' Yaseen Ibrahim
Published: (2010)
by: Shakhatreh, Ala' Yaseen Ibrahim
Published: (2010)
Development of Virtual Robot Assisted Learning (VRAL) in Robotic Course Using Virtual Environment Technique
by: Noraina, Mohamad
Published: (2005)
by: Noraina, Mohamad
Published: (2005)
A hybrid semantic similarity feature-based to support multiple ontologies
by: Omar, Nurul Aswa
Published: (2017)
by: Omar, Nurul Aswa
Published: (2017)
Optimal QoS aware multiple paths web service composition using heuristic algorithms and data mining techniques
by: Qtaish, Osama Kayed Taher
Published: (2014)
by: Qtaish, Osama Kayed Taher
Published: (2014)
Development of Kemahiran Hidup Tingkatan Satu (1) Courseware Prototype Using User Centered Design (UCD) Methodology Based on the Modality Principle
by: Ahmad Fadhil, Ishtiyaq Ahmed
Published: (2010)
by: Ahmad Fadhil, Ishtiyaq Ahmed
Published: (2010)
Implementation of a Small System on a Small Organization: A Case Study of Unit Peperiksaan, JHEAIK
by: Mu'azah, Md. Aziz
Published: (2010)
by: Mu'azah, Md. Aziz
Published: (2010)
A Mobile Leave Application
by: Tariq, Suphian M
Published: (2010)
by: Tariq, Suphian M
Published: (2010)
A Requirement Model of Web-Based e-Procurement: A Case Study for UUM COLGIS
by: Yusmariani, Mohd Yusoff
Published: (2009)
by: Yusmariani, Mohd Yusoff
Published: (2009)
Similar Items
-
A secure message handler using microsoft cryptoapi
by: Eh Kan, Chessda Uttraphan
Published: (2003) -
An optimized attack tree model for security test case planning and generation
by: Omotunde, Habeeb, et al.
Published: (2018) -
Layered Security Approach for Mobile Computing
by: Abiodun, Bakare Mustapha
Published: (2011) -
Data mining in network traffic using fuzzy clustering
by: Mohamad, Shamsul
Published: (2003) -
Examination timetabling using genetic algorithm case study: KUiTTHO
by: Mohd Salikon, Mohd Zaki
Published: (2005)