Search Results - (( developing com interactive algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- interactive algorithm »
- java application »
- com interactive »
- application rsa »
- developing com »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
-
7
Sequence-based interaction testing implementation using Bees Algorithm
Published 2023Conference paper -
8
-
9
-
10
-
11
-
12
-
13
-
14
African Buffalo Optimization Algorithm Based T-Way Test Suite Generation Strategy for Electronic-Payment Transactions
Published 2021“…Experi-mental procedures indicate that the hybridization of the ABO with these algorithmic com-ponents led to faster convergence and greater effectiveness superior to the outcomes of existing techniques, thereby placing the algorithm among the best when compared with other methods/techniques.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
-
16
Interactive Fuzzy Logic Interface for Enhanced Real-Time Water Quality Index Monitoring
Published 2026journal::journal article -
17
Securing m-government transmission based on symmetric and asymmetric algorithms: A review
Published 2023Article -
18
Applying case reuse and Rule-Based Reasoning (RBR) in object-oriented application framework documentation: Analysis and design
Published 2023Conference Paper -
19
-
20
