Search Results - (( developing e processor algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- java application »
- application rsa »
- rsa algorithm »
- developing e »
- e processor »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
'Cruise-and-Collect' algorithm for an ARM-based autonomous robot
Published 2012“…The algorithm is developed via Flowcode software which exploits flowchart as its design entry. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Hybrid scheduling and dual queue scheduling
Published 2009Get full text
Get full text
Conference or Workshop Item -
7
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
8
Hybrid scheduling and dual queue scheduling
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
9
-
10
Design of a reconfigurable computing platform
Published 2023“…The RCP utilizes Impulse CoDeveloper which is an electronic system level (ESL) design tool that compiles sequential applications/algorithms in C to synthesizable HDL. …”
Conference paper -
11
Evaluation of reference signal estimation techniques for the control of shunt active power filter
Published 2023Conference paper -
12
Multiprocessor arbitration for AMBA interface in ASIC
Published 2021Get full text
Get full text
Get full text
Get full text
Article -
13
Design and implementation of a private and public key crypto processor for next-generation it security applications
Published 2006“…This paper presents the design and implementation of a crypto processor, a special-purpose embedded system optimized for the execution of cryptographic algorithms in hardware. …”
Get full text
Get full text
Get full text
Article -
14
Cache replacement algorithm using hierarchical allocation scheduling
Published 2014“…Therefore, latency between the processor and memory can be reduced. The existing cache replacement (i.e. least recently used (LRU)) algorithm depends on usage of the data being referenced. …”
Get full text
Get full text
Thesis -
15
-
16
-
17
-
18
-
19
A review on path collisions and resources usage in hybrid optical Network on Chip (HONoC)
Published 2023Conference Paper -
20
