Search Results - (( java implementation rsa algorithm ) OR ( iot implementation method algorithm ))
Search alternatives:
- implementation method »
- java implementation »
- implementation rsa »
- iot implementation »
- method algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment
Published 2024“…This paper presents the design, simulation, and performance measurement of Simon encryption algorithm in IoT environment. Simon algorithm is a lightweight encryption algorithm which suitable for resource constraint environment like IoT devices. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm
Published 2023“…Therefore, an intrusion detection method for attacking and detecting anomalies in an IoT system must be enhanced. …”
Get full text
Get full text
Article -
8
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…In order to provide an energy-efficient and secure routing method for sensors deployed within a dynamic IoT network, this paper presents a trust-aware enhanced ant colony optimization (ACO)-based routing algorithm, incorporating a lightweight trust evaluation model. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
TDMA scheduling analysis of energy consumption for iot wireless sensor network
Published 2019“…The major objective for this project is to re-implement the proposed Energy Topology DRAND (E-T-DRAND) algorithm in IoT WSN using time slot allocation method and allocate nodes together with the node energy information and compare the obtained results with the corresponding results in the base paper. …”
Get full text
Get full text
Thesis -
10
Multi-objective optimization for integrated task scheduling and load balancing in fog computing for IoT applications
Published 2025“…By using a task scheduling and offloading method, the FOCS algorithm arranges data according to size and sends it to the appropriate fog nodes. …”
Get full text
Get full text
Get full text
Thesis -
11
Internet of Things (IoT) based activity recognition strategies in smart homes: a review
Published 2022“…Human activity recognition is one of the services provided by this IoT method of data collection from the sensor network when activated by residents. …”
Get full text
Get full text
Article -
12
Faulty sensor detection mechanism using multi-variate sensors in IoT
Published 2019“…The second method proposed is based on a correlation method that can exploit the multi-variable sensor which existing in IoT application. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The proposed algorithm improved the response time, delay, number of offloaded tasks, throughput, and energy consumption of the IoT requests. …”
Get full text
Get full text
Article -
14
Grouping based radio frequency identification anti-collision protocols for dense internet of things application
Published 2022“…This paper analyzes selected grouping-based algorithms. Their underlining principles are discussed including their tag estimation methods. …”
Get full text
Get full text
Article -
15
Optimising Connectivity and Energy : The Future of LoRaWAN Routing Protocols for Mobile IoT Applications
Published 2025“…However, the mobility of IoT devices introduces challenges in optimizing energy efficiency. …”
Get full text
Get full text
Get full text
Article -
16
-
17
-
18
-
19
-
20
