Search Results - (( java implementation rsa algorithm ) OR ( data implementation during algorithm ))
Search alternatives:
- implementation during »
- java implementation »
- data implementation »
- implementation rsa »
- during algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Festive season balancing groceries optimization / Fairuz Mohamed Razi
Published 2012“…The most important part is during system design and implementation. In this phase, method use in Genetic Algorithm to optimize the system prototype is Rastrigin's function to calculate the fitness of the chromosomes.…”
Get full text
Get full text
Thesis -
7
A study of fluctuations in genetic algorithm optimized network in data centre
Published 2017“…Study of fluctuation in genetic algorithm has been a sub-objective in genetic algorithm implementations. …”
Get full text
Get full text
Article -
8
A study of fluctuations and confidence of implementation in genetic algorithm optimized network in data centre
Published 2018“…Study of fluctuation in genetic algorithm has been a sub-objective in genetic algorithm implementations. …”
Get full text
Get full text
Article -
9
A study of fluctuations and confidence of implementation in genetic algorithm optimized network in data centre
Published 2018“…Study of fluctuation in genetic algorithm has been a sub-objective in genetic algorithm implementations. …”
Get full text
Get full text
Article -
10
-
11
The Development Of System For Algorithms Visualization Using Simjava
Published 2020“…Moreover, algorithm visualization systems are also useful tools in algorithm engineering, particularly at several stages during the design, implementation, analysis, tuning, experimental evaluation, and presentation of the algorithms process. …”
Get full text
Get full text
Get full text
Article -
12
COVID-19 DATA EXPLORATION USING MAPPER ALGORITHM
Published 2023“…Application of mapper algorithm through Kepler Mapper, a python implementation of mapper is done to construct mapper graphs for state wise COVID�19 data in Malaysia along year 2021. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
13
CHAOS BASED BLOCK ENCRYPTOR
Published 2008“…This project is basically a block encryption to protect block of data. In this project we will propose encryption algorithm which offer less computational complexity and also provide securing data not only during transmission but also during storage. …”
Get full text
Get full text
Final Year Project -
14
Design and Implementation of Advanced Encryption Standard Using Verilog HDL
Published 2020“…One of the main concerns involving software implementation of encryption algorithm is the possibility of slower processing when transmitting and receiving data which consequently will encounter low security level during process of encryption for real-time application. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…The obvious problem in this SM is it uses single communication system as there was no contingency plan in transferring the data when the signal strength was weak or failure during data transfer process. …”
Get full text
Get full text
Thesis -
16
Design and implementation of advanced encryption standard using verilog HDL
Published 2022“…One of the main concerns involving software implementation of encryption algorithm is the possibility of slower processing when transmitting and receiving data which consequently will encounter low security level during process of encryption for real-time application. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Traffic management algorithms for LEO satellite networks
Published 2016“…Those two algorithms are combined together due to the strong possibilities of being unable to achieve the optimal results when implemented separately. …”
Get full text
Get full text
Get full text
Thesis -
18
-
19
An efficient real-time terrain data organization and visualization algorithm based on enhanced triangle-based level of detail technique
Published 2006“…According to the results obtained during the pre-processing, the partitioning of digital elevation data into tiles has successfully reduced the data size although it required a longer processing time. …”
Get full text
Get full text
Thesis -
20
