Search Results - (( developing fit perceptions algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- perceptions algorithm »
- java application »
- fit perceptions »
- application rsa »
- developing fit »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…The comparison of results is based on the different user's perceptions, their involvement in the VIGA-20 and the difference of the fitness convergence as compared to Simple Genetic Algorithm.…”
Get full text
Get full text
Thesis -
7
-
8
Particle-based perception of garment folding for robotic manipulation purposes
Published 2023Article -
9
Zero distortion-based steganography for handwritten signature
Published 2018“…This means that any changes on the cover media (c) could lead to the identification of the stego media (s), which contains the secret message (m). Thus, developing a steganographic algorithm to use cover media (c) without raising attention is the most challenging task in data hiding. …”
Get full text
Get full text
Get full text
Thesis
