Search Results - (( integer application need algorithm ) OR ( java implementation rsa algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    An Integer Linear Programming model and Adaptive Genetic Algorithm approach to minimize energy consumption of Cloud computing data centers by Ibrahim, Huda, Aburukba, Raafat O., El-Fakih, Khaled

    Published 2018
    “…Hence, solutions are needed to minimize the energy consumption. This paper focuses on the development of a dynamic task scheduling algorithm by proposing an Integer Linear Programming (ILP) model that minimizes the energy consumption in a Cloud data center. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9
  10. 10

    A mixed integer linear programming model for real-time task scheduling in multiprocessor computer system by Oluwadare, Samuel Adeboyo, Akinnuli, Basil Oluwafemi

    Published 2012
    “…There has been an upsurge in real-time multimedia applications in recent time.On a network, the ability of an average uni processor computer to handle such data may be limited due to the large size of such data.Also, there may be a high number of concurrent users who may want to retrieve data and the need to process them in real-time; and in continuous stream. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13
  14. 14

    Randomized pixel selection for enhancing LSB algorithm security against brute-force attack by Mohamad Afendee, Mohamed, Ammar, Y. Tuama, Mohamad, A. Mohamed, Abdullah, Muhammed, Zurina, M. Hanapi

    Published 2017
    “…However, operating pixels on a sequential basis leaves the algorithm susceptible to many steganalysis techniques. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20