Search Results - (( java implementation rsa algorithm ) OR ( program cloud system algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- system algorithm »
- rsa algorithm »
- program cloud »
- cloud system »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
System program management environment in cloud computing using hybrid Genetic Algorithm and Moth Flame Optimization (GA-MFO)
Published 2022“…This project present a system program algorithm based on Moth Flame Optimization (MFO) algorithm to assign an optimal set of system program to meet the satisfaction of quality of service requirements of cloud computing in such a way that the total execution time of tasks is minimized. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
7
-
8
Automatic marking system for programming subject
Published 2023Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013Get full text
Get full text
Research Reports -
10
-
11
-
12
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
13
-
14
-
15
Neural network methods to solve the Lane–Emden type equations arising in thermodynamic studies of the spherical gas cloud model
Published 2017“…Strength of efficient local optimization procedures based on active-set (AS), interior-point (IP) and sequential quadratic programming (SQP) algorithms is used to optimize the energy functions. …”
Get full text
Get full text
Get full text
Article -
16
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…The security aspects in Cloud computing is paramount in order to ensure high quality of Service Level Agreement (SLA) to the cloud computing customers. …”
Get full text
Get full text
Conference or Workshop Item -
17
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…The security aspects in Cloud computing is paramount in order to ensure high quality of Service Level Agreement (SLA) to the cloud computing customers. …”
Get full text
Get full text
Conference or Workshop Item -
18
Critical insight for MAPReduce optimization in Hadoop
Published 2014“…Cloud applications such as data storage, data retrieval and data portability have become significant requirements for cloud computing. …”
Get full text
Get full text
Get full text
Article -
19
Space allocation for examination scheduling using Genetic Algorithm / Alya Kauthar Azman
Published 2025“…Implementing real-time data updates through cloud-based platforms could further improve system scalability. …”
Get full text
Get full text
Thesis -
20
Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman
Published 2016“…Mobile edge cloud computing (MECC) systems extend computational, networking, and storage capabilities of centralized cloud computing systems through edge servers at one-hop wireless distances from mobile devices. …”
Get full text
Get full text
Get full text
Thesis
