Search Results - (( java implementation rsa algorithm ) OR ( parameter program mobiliti algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- mobiliti algorithm »
- rsa algorithm »
- parameter »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Quality of service in mobile IP networks with parametric multi-channel routing algorithms based on linear programming approach
Published 2018“…This approach tunes the parameters of the linear programming models that are used in the other algorithms by using a dynamic element. …”
Get full text
Get full text
Thesis -
7
Effects of Authentication of Users in Mobile Internet Protocol Version 6
Published 2004“…The password system is also recommended as a viable solution for this authentication as its implementation is most convenient for mobile users. A password algorithm is proposed from which a program can be written in any language deemed suitable.…”
Get full text
Get full text
Thesis -
8
-
9
Development of robust control scheme for wheeled mobile robot in restricted environment
Published 2021“…A novel algorithm so called laser simulator logic (LSL) has been develo ped to estimate the inertia moment when the environment is noisy and cannot use fuzzy logic algorithm. …”
Get full text
Get full text
Thesis -
10
A coverage path planning approach for autonomous radiation mapping with a mobile robot
Published 2023Article -
11
Enhancing navigation accuracy of Turtlebot3 Burger mobile robot
Published 2024“…To address this challenge, the Kalman Filter algorithm is implemented in this robot, as it is widely used for mobile robot navigation and system integration. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Hybrid Energy Encryption of Wireless Power Transfer Algorithm for Near Field Range
Published 2024thesis::doctoral thesis -
13
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
Published 2018“…The OMNET++ simulation program is used to justify the proposed algorithms. …”
Get full text
Get full text
Get full text
Thesis -
14
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The obvious amount of lost money of victims has led to many court cases where victim and theft claims the ownership of the program and the winner is who has a good lawyer. Many programming languages are used for programming; Java programming language is known to be most common due to its features, the use of this popular language increases an attacker's ability to steal intellectual property (IP), as the source program is translated to an intermediate format retaining most of the information such as meaningful variables names present in source code. …”
Get full text
Get full text
Thesis
