Search Results - (( integer application need algorithm ) OR ( java implementation rsa algorithm ))
Search alternatives:
- integer application »
- java implementation »
- implementation rsa »
- application need »
- need algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
An Integer Linear Programming model and Adaptive Genetic Algorithm approach to minimize energy consumption of Cloud computing data centers
Published 2018“…Hence, solutions are needed to minimize the energy consumption. This paper focuses on the development of a dynamic task scheduling algorithm by proposing an Integer Linear Programming (ILP) model that minimizes the energy consumption in a Cloud data center. …”
Get full text
Get full text
Article -
7
A genetic algorithm for capital budgeting problem with fuzzy parameters
Published 2010Get full text
Get full text
Conference or Workshop Item -
8
-
9
Evolutionary Algorithms In Auction Models Of Service Procurement
Published 2019Get full text
Get full text
Thesis -
10
A mixed integer linear programming model for real-time task scheduling in multiprocessor computer system
Published 2012“…There has been an upsurge in real-time multimedia applications in recent time.On a network, the ability of an average uni processor computer to handle such data may be limited due to the large size of such data.Also, there may be a high number of concurrent users who may want to retrieve data and the need to process them in real-time; and in continuous stream. …”
Get full text
Get full text
Get full text
Article -
11
Comparison Of Two Hybrid Algorithms On Incorporated Aircraft Routing And Crew Pairing Problems
Published 2024Get full text
Get full text
journal::journal article -
12
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
13
-
14
Randomized pixel selection for enhancing LSB algorithm security against brute-force attack
Published 2017“…However, operating pixels on a sequential basis leaves the algorithm susceptible to many steganalysis techniques. …”
Get full text
Get full text
Article -
15
Programming Approach in Teaching Operations Research Techniques for Computer Science Students
Published 2005Get full text
Get full text
Conference or Workshop Item -
16
-
17
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
18
-
19
-
20
