Search Results - (( java implementation rsa algorithm ) OR ( program information within algorithm ))
Search alternatives:
- java implementation »
- program information »
- implementation rsa »
- information within »
- within algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Vision-based robot indoor navigation
Published 2022“…The user will only have to give the program relevant coordinate information and running mode. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Problem restructuring in interger programming for reduct searching
Published 2003“…Standard Integer Programming / Decision Related Integer Programming (SIP/DRIP) is a reduct searching system that finds the reducts in an information system. …”
Get full text
Get full text
Thesis -
8
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…This was due to each solution deploy was highly depended with the algorithms reside in the program loaded in the security tools. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
10
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…This research algorithm demonstrated a very promising result with Support Vector Machines, this algorithm produces a 90% of accuracies whereas the decision tree algorithm gets 100% accuracies. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
-
12
Pengurusan rantaian bekalan menggunakan MRP dan DRP di FAMA
Published 2005“…This system is developed using web application to help the management team in sharing information. The Wagner Within Algorithm is being used to determine the lot sizing to obtain the optimum order quantity. …”
Get full text
Get full text
Thesis -
13
Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation
Published 2023Conference paper -
14
Vehicle Routing Problem with Simultaneous Pickup and Delivery
Published 2020Get full text
Get full text
Article -
15
-
16
-
17
Innovative smart phone learning system for graphical systems within covid-19 pandemic
Published 2023“…With restrictions on face-to-face clinical consultations within the COVID-19 pandemic and the challenges faced by healthcare systems in delivering patient care, alternative information technologies like telemedicine and smartphones play a crucial role. …”
Article -
18
-
19
Traffic congestion detection for smart and control transportation management
Published 2020Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
Fire-flame imaging using electrical capacitance tomography
Published 2006“…Electrical Capacitance Tomography (ECT) is a non-intrusive technique for obtaining information about the distribution of the contents of closed pipes by measuring variations in the dielectric permittivity of the material within the electrodes sensing region. …”
Get full text
Get full text
Get full text
Article
