Search Results - (( java implementation rsa algorithm ) OR ( java communication tool algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- java communication »
- communication tool »
- tool algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
A survey of energy-aware real time scheduling tools
Published 2015Get full text
Get full text
Conference or Workshop Item -
7
EasyA: Easy and effective way to generate pairwise test data
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Classroom finder system with student availability, space and time constraint
Published 2024“…Scrum methodology was selected for the development methodology of this project while the tools of HTML, CSS, JavaScript, Bootstrap, Jinja2 Template Engine, Flask, SQLite and VS Code are used in the development of this project. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
Get full text
Get full text
Thesis -
10
Mobile application for real time baby sign language recognition using YOLOv8 / Siti Aishah Idris and Ahmad Firdaus Ahmad Fadzil
Published 2024“…The model will be designed and developed using a deep learning algorithm, which is YOLOv8, the latest version of YOLO. …”
Get full text
Get full text
Get full text
Article -
11
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis
