Search Results - (( java application customization algorithm ) OR ( based observations rsa algorithm ))
Search alternatives:
- customization algorithm »
- based observations »
- java application »
- observations rsa »
- rsa algorithm »
-
1
A comparative review on symmetric and asymmetric dna-based cryptography
Published 2023“…As observed, the computational time of RSA algorithm combined with DNA coding was longer. …”
Article -
2
New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field
Published 2011“…Also, from observation, it is effective to use the new signed-digit {0,1,3}-NAF scalar multiplication algorithm when the percentage of the nonzero digit in the binary expansion is less than 75%. …”
Get full text
Get full text
Thesis -
3
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
4
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
