Search Results - (( java application rsa algorithm ) OR ( wolf optimization sensor algorithm ))
Search alternatives:
- optimization sensor »
- wolf optimization »
- java application »
- sensor algorithm »
- application rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
Coverage and connectivity maximization for wireless sensor networks using improved chaotic grey wolf optimization
Published 2025“…The Grey Wolf Optimizer (GWO) is enhanced using a chaotic map, improving its ability to find the best solutions and achieve faster convergence, resulting in the ICGWO algorithm. …”
Get full text
Get full text
Get full text
Article -
4
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
5
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
6
-
7
Development an accurate and stable range-free localization scheme for anisotropic wireless sensor networks
Published 2022“…This study developed an optimized variation of the DV-Hop localization algorithm for anisotropic wireless sensor networks. …”
Get full text
Get full text
Thesis -
8
Energy-efficient routing using novel optimization with Tabu techniques for Wireless Sensor Network
Published 2022“…In the proposed method, a novel Grey Wolf Improved Particle Swarm Optimization with Tabu Search Techniques (GW-IPSO-TS) was used. …”
Get full text
Get full text
Get full text
Article -
9
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis
