Search Results - (( developing online implication algorithm ) OR ( java implementation rsa algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Web-based marketing communication to develop brand image and brand equity of higher educational institutions: a structural equation modelling approach by Momen, Md. Abdul, Sultana, Seyama, Haque, A. K. M. Ahasanul

    Published 2019
    “…Research limitations/implications – Future research can be done considering both online and conventional marketing communications for the same purpose. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A conceptual multi-agent framework using ant colony optimization and fuzzy algorithms for learning style detection by Basheer G.S., Ahmad M.S., Tang A.Y.C.

    Published 2023
    “…We discuss both agent and multi-agent systems and focus on the implications of the theory of detecting learning styles that constitutes behaviors of learners when using online learning systems, learner's profile, and the structure of multi-agent learning systems. …”
    Conference Paper
  8. 8

    Innovating communication adaptation on social media using AI-based decision support systems by Zakaria, Noor Azura, Adriana, Dadi, Budi, Danang Surya, Mardiana, Mardiana, Rafika, Ageng Setiani, Asmawati, Ari

    Published 2025
    “…The study contributes practical implications for developers and practitioners aiming to design intelligent platforms that empower social media users with innovative tools for communication adaptation, ultimately driving more effective and engaging digital experiences…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Capabilities and competencies related to leadership performance effectiveness in the context of change in Malaysian Higher Education Institutions / Majid Ghasemy by Majid , Ghasemy

    Published 2017
    “…For this purpose, the online version of the survey was administered among academic leaders in 25 public and private universities. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12
  13. 13

    Measuring the effects of strategic capability, entrepreneurial orientation, servant leadership, and assistive technology on success of visually impaired leaders by Harziah, Khalid Yunus

    Published 2021
    “…A theoretical framework was developed based on existing literature. The data was collected through an online survey by sending a link of questionnaires via WhatsApp to all visually impaired leaders in Malaysia. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    A conceptual anonymity model to ensure privacy for sensitive network data by Arafat, N.H.M., Pramanik, Md Ileas, Abu Jafar, Md Muzahid, Lu, Bibo, Jahan, Sumaiya, Murad, Saydul Akbar

    Published 2021
    “…The growing popularity of this industry, as well as the required development of data sharing tools and technology, pose major threats to an individual's sensitive information privacy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item