Search Results - (( java implementation learning algorithm ) OR ( using text rsa algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- learning algorithm »
- rsa algorithm »
-
1
-
2
Modified multi prime RSA cryptosystem
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item -
3
-
4
-
5
RSA Encryption & Decryption using JAVA
Published 2006“…The receiver of the encrypted text uses a "key" to decrypt the message, returning it to its original plain text form. …”
Get full text
Get full text
Final Year Project -
6
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
7
A comparative S-index in factoring RSA modulus via Lucas sequences
Published 2016Get full text
Get full text
Conference or Workshop Item -
8
-
9
-
10
New directions in factoring the prime power RSA modulus N = prq
Published 2016Get full text
Get full text
Conference or Workshop Item -
11
A RSA-type cryptosystem based on quartic polynomials
Published 2011Get full text
Get full text
Thesis -
12
-
13
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
14
-
15
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023Get full text
Get full text
Student Project -
16
-
17
-
18
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…Performance has always been the most critical characteristic of a cryptographic algorithm, which determines its effectiveness. In this research the most popular and used algorithm, which is RSA, is implemented with a new modification in order to reduce the calculation time of the algorithm. …”
Get full text
Get full text
Thesis -
19
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…It is not done only by encrypting it but also providing access to the data only on successful authentication. ECC, AES, and RSA algorithms will be used to encrypt the files to enhance security data on the cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
20
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis
