Search Results - (( java implementation rsa algorithm ) OR ( based computer work algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- based computer »
- work algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper
Published 2016“…Feature extraction is a preliminary step before 3D reconstruction and therefore, a junction detection algorithm is proposed. The presented algorithm benefits in omitting unnecessary junctions that are problematic for object recognition in comparison to the closest algorithm to our work. …”
Get full text
Get full text
Thesis -
7
Hybrid test redundancy reduction strategy based on global neighborhood algorithm and simulated annealing
Published 2018“…There are already many works in the literature exploiting the greedy computational algorithms as well as the meta-heuristic algorithms, but no single strategy can claim dominance in terms of test data reduction over their counterparts. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
-
9
-
10
-
11
An efficient VM scheduling algorithm to minimize the makespan and maximize the profit
Published 2019“…The second process is hyper analytical task scheduling algorithm, and based on the scheduled task, the policy based profit maximization algorithm was proposed in final process. …”
Get full text
Get full text
Thesis -
12
Local Stereo Matching Algorithm Using Modified Dynamic Cost Computation
Published 2021“…Traditional framework composition consists of several constraints in stereo correspondences such as illumination variations in images and inadequate or non-uniform light due to uncontrollable environments. This work improves the local method stereo matching algorithm based on the dynamic cost computation method for depth measurement. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…These algorithms are formulated for computing Tate and ate pairing. …”
Get full text
Get full text
Thesis -
14
Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement
Published 2016“…In previous work, an Adaptive Linear Neuron (ADALINE) based extraction algorithm has been developed to generate reference currents. …”
Get full text
Get full text
Thesis -
15
-
16
Kernel and multi-class classifiers for multi-floor wlan localisation
Published 2016“…For fingerprint database optimisation, novel access point (AP) selection algorithms which are based on variant AP selection are investigated to improve computational accuracy compared to existing AP selection algorithms such as Max-Mean and InfoGain. …”
Get full text
Get full text
Thesis -
17
A new cryptographic algorithm based on decomposition problem in elliptic curve cryptography / Hilyati Hanina Zazali
Published 2012“…It is a new approach which performs core operation using multiplication of points based in ECC. The algorithm explores computational advantages of computing cofactor number of points on E and it is computationally infeasible to obtain if the cofactor are large enough. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
18
-
19
Multi-objective scientific workflow scheduling algorithm in multi-cloud environment for satisfying QoS requirements
Published 2022“…Third, to propose a fault-intrusion-tolerant algorithm (FITSW), which is based on both fault and intrusion-tolerant techniques, to decrease the adverse impact caused by different faults (accidental and malicious) in cloud computing systems. …”
Get full text
Get full text
Thesis -
20
