Search Results - (( java application rsa algorithm ) OR ( dramatic implementation some algorithm ))
Search alternatives:
- dramatic implementation »
- implementation some »
- java application »
- application rsa »
- some algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
An automatic diacritization algorithm for undiacritized Arabic text
Published 2017“…Moreover, this research is to implement and evaluate the accuracy of the algorithm for dialectal Arabic text. …”
Get full text
Get full text
Get full text
Thesis -
7
Benchmarking of Bat-inspired Interaction Testing Strategy
Published 2016“…T-way interaction testing has been extensively exploited resulting into many prototypes strategy implementations. Recently, there are growing interests for adopting optimization algorithms as the basis of the newly developed strategies contributing to the new and upcoming search based software testing (SBST) area of research. …”
Get full text
Get full text
Get full text
Article -
8
Simulation of quantum growing network / Ong Boon Teong
Published 2003“…Although modem computers already exploit some quantum phenomena they do not make use of the full repertoire of quantum phenomena that Nature provides. …”
Get full text
Get full text
Thesis
