Search Results - (( developing formative programmes algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- developing formative »
- java application »
- application rsa »
- rsa algorithm »
- programmes »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Design and development of high performance swa cell design for local DNA sequence alignment
Published 2017“…The OSL, OSA and ORSL proposed a new optimized two bit data representation format for DNA sequence characters, which is previously designed based on the eight bit ASCII 2 characters format. …”
Get full text
Get full text
Thesis -
7
Development of low cost 3D scanner (LC3S) using Matlab and FPGA / Abdul Rais Abdul Rahim ...[et al.]
Published 2018“…So, a low cost 3D scanner is designed to produce accurate and detailed 3D model data at minimum cost for any users. Triangulation algorithm is applied and a software for scanning and improving the image is developed using MATLAB. …”
Get full text
Get full text
Get full text
Article -
8
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
Get full text
Get full text
Thesis -
9
A smart metering for energy management system via GSM-SMS based protocol
Published 2011“…A study of local electricity structure shows that the individual user's consumption pattern is not a responsible one which leaves opportunity for policy makers to introduce new habit formation programmes like variable time pricing etc. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Effects of Ambient Tropospheric Ozone on Mr-219 Rice in the Muda Irrigation Scheme Area
Published 2005“…For plant growth and development study, yield is the most critical parameter. …”
Get full text
Get full text
Thesis
