Showing 1 - 14 results of 14 for search '"MD5"', query time: 0.08s Refine Results
  1. 1

    Data depublication using : Hashing algorithm / Naimah Nayan by Nayan, Naimah

    Published 2019
    “…The objective of this project is to compare MD5 & SHA-1 algorithm in data deduplication technique and to evaluate the MD5 & SHA-1 algorithm, length of message digest and speed using deduplication software. …”
    Get full text
    Thesis
  2. 2

    PEMANFAATAN KOMUNIKASI JEJARING SOSIAL UNTUK PEMANTAUAN POLUSI UDARA by , MEUTHIA FAWZIA, , Drs. Bambang Nurchayo Prastowo, M. Sc

    Published 2014
    “…MD5 can detects smallest changes if thereâ��s any damage data between USB serial connection because it has avalanche effect. …”
    Thesis
  3. 3

    A study on one way hashing function and its application for FTMSK webmail / Noor Hasimah Ibrahim Teo by Ibrahim Teo, Noor Hasimah

    Published 2005
    “…One-way hashing function consists of several algorithms. However MD5 is the most common hashing function currently in use. …”
    Get full text
    Thesis
  4. 4

    Integrating security services into active network by Mandala, Satria

    Published 2005
    “…The results demonstrated that the authentication based on RIPEMD320 was faster than MD5 and SHA-512., and SHA-512 is more secure than the others.…”
    Get full text
    Thesis
  5. 5

    Dynamic hashing technique for bandwidth reduction in image transmission by Noroozi, Erfaneh

    Published 2015
    “…The proposed algorithm had achieved the lowest dynamic size (1 KB) with no fix length of the original file compared to MD5, SHA-1 and SHA-2 hash algorithms. The robustness of hashed message was tested against the substitution, replacement and collision attacks to check whether or not there is any detection of the same message in the output. …”
    Get full text
    Thesis
  6. 6
  7. 7

    Development of Android/iPhone application for image processing and searching by Zhang, Jiawei

    Published 2016
    “…With the WeChat API, the application realize the function of comparing the captured photo with the data library for the result of target MD5 code and use the code as an index obtain the specific name of the logo in the taken photo. …”
    Get full text
    Thesis
  8. 8

    SISTEM INFORMASI MUSEUM KOTA YOGYAKARTA by , IRMAN ARIADI, , Nur.Mohammad. Farda S.Si, M.Cs

    Published 2013
    “…Encrypted spasial database using Google Fusion Table with no id : 1MD5udPpvcCfCRZZSlOo1-HSPgaHUsaLhlHyNImA. The result of research in Web Gis can be found in : www.museum.iariadi.web.id.…”
    Thesis
  9. 9

    Sistem gerbang pembayaran atas talian melalui internet by Mohd Akhir, Chairil Anwar

    Published 2009
    “…MasterCard International Gateway Services (MIGS) have set a high level security during server-to-server communications using the cryptography hashing functions Message-Digest algorithm 5 (MD5). While, communication with the MEPS system using Public Key Infrastructure (PKI). …”
    Get full text
    Thesis
  10. 10

    PENERAPAN MODIFIKASI LACK STEGANOGRAPHY DAN LAYANAN MESSAGE AUTHENTICATION CODE PADA KOMUNIKASI MULTIMEDIA by , Huzain Azis, , Drs. Retantyo Wardoyo, M.Sc, Ph.D.

    Published 2013
    “…End of the study the system will go through the process of functionality and performance testing. the result showed that the modification of LACK on payload field of Theora codec has a large capacity of hiding places and flexible, Using MD5 includes simetric key provide authentication and integrity service for steganogram.…”
    Thesis
  11. 11

    Genomically encoded logic gates and cell-cell communication devices for the implementation of a cryptographic hashing algorithm in living cells by Padmakumar, Jai Phiroze

    Published 2023
    “…Together, these tools were used to implement a recoded version of the MD5 hashing funcon, a historically widely used cryptography algorithm. …”
    Get full text
    Thesis
  12. 12

    MP3 audio steganography technique using extended least significant bit by Mohammed Atoum, Mohammed Salem

    Published 2014
    “…For extracting the secret message, the permutation code book is used to reorder the message blocks into its original form. Md5sum and SHA-256 are used to verify whether the secret message is altered or not during transmission. …”
    Get full text
    Thesis
  13. 13

    A Comparative study of haemodynamic effects between two different doses of oxytocin in lower segment caesarian section under spinal anaesthesia by Zainudin, Asmah

    Published 2013
    “…There was a larger decrease in MAP in patients who received 10 unit, MD — 12.54 mmHg (15.1%), p value <0.0001 than in those who received 2 unit, MD= - 5.46 mmHg (7.1 %), p value = 0.023 There was a greater increase in mean heart rate in patients who received 10 unit , MD - +9.20 bpm (10.2%), p value <0.0001 than in those who received 2 unit , MD= -+8.23 bpm (9.5%), p value = 0.004. …”
    Get full text
    Thesis
  14. 14

    Structural diversity chemosystematics and biological potential of Bornean liverworts (order jungermanniales) by Ng, Shean Yeaw

    Published 2017
    “…In addition, herbertene-1,2-diol (MD- 5) isolated from Mastigophora diclados showed inhibition against HL-60 cells in a dose-dependent manner through induction of apoptosis. …”
    Get full text
    Get full text
    Thesis