Search Results - (( basic case maximization algorithm ) OR ( java implementation rsa algorithm ))
Search alternatives:
- maximization algorithm »
- java implementation »
- implementation rsa »
- case maximization »
- rsa algorithm »
- basic case »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
On Clustering Algorithm Of Coverage Area Problems In Wireless Sensor Networks
Published 2024“…In the case study, many algorithms have been proposed in the literature, in order to find the maximum number of disjoint or non-disjoint sets of sensor cover sets, we can see where one set can be active at any one time. …”
Article -
7
-
8
Public healthcare facility planning in Malaysia : Using location allocation models / S. Sarifah Radiah Shariff
Published 2012“…This study attempts to develop some mathematical location-allocation models for the locations of the public health care facilities in Malaysia. Two basic location allocation models with two different objectives are studied: The p-median problem and the Maximal Covering Location Problem (MCLP). …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
9
An innovative approach of blending security features in energy-efficient routing for a crowded network of wireless sensors
Published 2014“…Energy efficiency is also very necessary to maximize the lifetime of the network.…”
Get full text
Get full text
Get full text
Book Chapter
