Search Results - (( developing islamic function algorithm ) OR ( java implementation rsa algorithm ))
Search alternatives:
- java implementation »
- function algorithm »
- implementation rsa »
- islamic function »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
-
7
-
8
-
9
A modified crow search algorithm with niching technique for numerical optimization
Published 2019Get full text
Get full text
Conference or Workshop Item -
10
A modified crow search algorithm with niching technique for numerical optimization
Published 2019Get full text
Get full text
Conference or Workshop Item -
11
Asset liability management model: The case of selected Islamic banks in Malaysia / Chong Hui Ling
Published 2017“…The multi-faceted objectives consist of the bank‟s expected returns and risks tolerance with constraints (also known as restraining functions to reflect the limitations placed on the Islamic bank‟s operating requirements), established using computational mathematics and algorithms with the aid of the MATLAB programming software. …”
Get full text
Get full text
Get full text
Thesis -
12
-
13
Developing an Islamic Farayez system applying software engineering
Published 2019“…Hence, DFD illustrated the organization of the functional components of the system; and as a consequence, based on this, the graphical form of algorithm or flow-chart of the overall Islamic Farayez system is developed. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Semantic analysis system by using latent semantic analysis (LSA) algorithm on khutbah texts / Ammar Zuber
Published 2019“…This project is developed by using Waterfall Model methodology as it’s the most direct model that is suitable for developing a system which consist of 5 phases which are Requirement Analysis, Design, Implementation, Testing and Maintenance. …”
Get full text
Get full text
Thesis -
16
-
17
Numerical Integration Based on Linear Legendre Multi Wavelets
Published 2024journal::journal article -
18
-
19
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
20
Single fitness function analysis of energy-consumption and radio bandwidth management in coverage area problems
Published 2024thesis::master thesis
