Search Results - (( java implementation rsa algorithm ) OR ( basic virtualization technique algorithm ))
Search alternatives:
- virtualization technique »
- basic virtualization »
- java implementation »
- implementation rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
A Collision Detection Algorithm For Virtual Robot-Centered Flexible Manufacturing Cell
Published 2008“…This thesis presents a collision detection algorithm for accurate simulation of a virtual flexible manufacturing cell. …”
Get full text
Get full text
Thesis -
7
-
8
-
9
Integration of enchanced jump point search (JPS) algorithm with modified bresenham technique for path planning in virtual grid-based environment
Published 2018“…The first approach is the enhancement of the JPS technique. Basically, the original JPS technique consists of two rules; pruning rules and jumping rules. …”
Get full text
Get full text
Get full text
Thesis -
10
The online mastermind game / Cheong Kuen Leion
Published 2003“…This game shows the basic concept that is used in solving problems.…”
Get full text
Get full text
Thesis -
11
A calibration framework for swarming ASVs' system design
Published 2012“…Webots™, and the pre-deployment in a swimming pool environment based on an improved simplest navigation technique. Swimming pool provides as a controlled calibration framework for the proposed swarming algorithm. …”
Get full text
Get full text
Get full text
Article -
12
Hand gesture recognition system using image processing
Published 2007“…This system also used algorithm of several processing technique that may or may not be the same output for each type of it. …”
Get full text
Get full text
Thesis -
13
Hand gesture recognition system using image processing
Published 2007“…This system also used algorithm of several processing technique that may or may not be the same output for each type of it. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Application of clustering in managing unstructured textual data in relational database / Wael Mohamed Shaher Yafooz
Published 2014“…Thus, the proposed technique can increase retrieval performance and produce high accuracy textual data clusters. …”
Get full text
Get full text
Thesis
