Search Results - (( java adaptation optimization algorithm ) OR ( after implementation rsa algorithm ))
Search alternatives:
- adaptation optimization »
- after implementation »
- implementation rsa »
- java adaptation »
- rsa algorithm »
-
1
Enhancement of RSA Key Generation Using Identity
Published 2015“…Therefore the Tripathi algorithm needs to be improved. Proposed algorithm called CLB-RSA has been implemented. …”
Get full text
Get full text
Get full text
Book Chapter -
2
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
3
Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa...
Published 2019“…Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). …”
Get full text
Get full text
Student Project -
4
Data classification based on confidentiality in virtual cloud environment
Published 2014“…The K-Nearest Neighbour (K-NN) classifier is used for data classification and the Rivest, Shamir and Adelman (RSA) algorithm is used to encrypt sensitive data. …”
Get full text
Get full text
Article -
5
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
Get full text
Get full text
Get full text
Get full text
Thesis
