Search Results - (( java implementation rsa algorithm ) OR ( program interaction modified algorithm ))

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A study on solution of matrix riccati differential equations using ant colony programming and simulink / Mohd Zahurin Mohamed Kamali by Mohamed Kamali, Mohd Zahurin

    Published 2015
    “…In this thesis, we implement the modified ant colony programming (ACP) algorithm for solving the matrix Riccati differential equation (MRDE). …”
    Get full text
    Get full text
    Thesis
  7. 7

    An evaluation of Monte Carlo-based hyper-heuristic for interaction testing of industrial embedded software applications. by S. Ahmed, Bestoun, Enoiu, Eduard, Afzal, Wasif, Kamal Z., Zamli

    Published 2020
    “…Hyper-heuristic is a new methodology for the adaptive hybridization of meta-heuristic algorithms to derive a general algorithm for solving optimization problems. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    A study on the efficiency of the object model for a dynamic feedback mechanism in network simulator 2 (NS-2) / Nor Adora Endut, Rozianawaty Osman and Noorazida Mohd Idris by Endut, Nor Adora, Osman, Rozianawaty, Mohd Idris, Noorazida

    Published 2008
    “…With CORBA having the overall view of the programming realm as individual objects allowing for interoperability, it offers the possibility to observe NS procedures and algorithms as objects and allow for a remote CORBA client to access these objects to be operated on without the direct access to the NS core itself. …”
    Get full text
    Get full text
    Research Reports
  10. 10

    New genetic operator for solving the travelling salesman problem / Fadzilawani Astifar Alias ... [et al.] by Alias, Fadzilawani Astifar, Shamsuddin, Maisurah, Mohamed, Siti Asmah, Mahlan, Siti Balqis

    Published 2015
    “…GA is implemented with some new operators called Nearest Fragment (NF) and Modified Order Crossover (MOC). GA implementation on TSP is done by using Microsoft C++ Programming. …”
    Get full text
    Get full text
    Article
  11. 11

    Compression of Three-Dimensional Terrain Data Using Lifting Scheme Based on Second Generation Wavelets by Pradhan, Biswajeet

    Published 2006
    “…The newly developed algorithm was applied to compress Light Detection and Ranging (LIDAR) data to check the efficiency of the program. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Development Of Finite Element Codes For Shear Wall Analysis by Paknahad, Masoud

    Published 2008
    “…In this study, new elements have been developed, modified constitutive law has been proposed, new computational algorithm has been utilised. …”
    Get full text
    Get full text
    Thesis
  13. 13