Search Results - (( java implementation rsa algorithm ) OR ( programming problem application algorithm ))
Search alternatives:
- application algorithm »
- java implementation »
- problem application »
- implementation rsa »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Signatory however use a special Digital Signature Application which store the secret private key. The application was programmed by JAVA FX. …”
Get full text
Get full text
Thesis -
3
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
4
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
5
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
6
Algorithm as a problem solving technique for teaching and learning of the Malay language
Published 2019Get full text
Get full text
Get full text
Proceeding Paper -
7
-
8
Optimal power flow based on fuzzy linear programming and modified Jaya algorithms
Published 2017“…The first proposed approach is a multi-objective fuzzy linear programming optimization (MFLP) algorithm to solve the MOOPF problem. …”
Get full text
Get full text
Thesis -
9
Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance
Published 2021“…The LP’s application is need to be further computed with a technique and Simplex algorithm is the one that commonly used. …”
Get full text
Get full text
Get full text
Thesis -
10
CSC752: Advanced Algorithm & Analysis / College of Computing, Informatics and Media
Published 2022“…The algorithm design techniques topics and applications include divide and conquer, greedy algorithms, dynamic programming, network flow, NP-complete, approximation and other advanced algorithms.…”
Get full text
Get full text
Get full text
Teaching Resource -
11
CSC752: Advanced Algorithm & Analysis / College of Computing, Informatics and Mathematics
Published 2018“…The algorithm design techniques topics and applications include divide and conquer, greedy algorithms, dynamic programming, network flow, NP-complete, approximation and other advanced algorithms.…”
Get full text
Get full text
Get full text
Teaching Resource -
12
-
13
Building an Algorithm for Measuring C Programming Assignments Quality
Published 2008Get full text
Get full text
Final Year Project -
14
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
Published 2004“…The shortest path problem has been widely studied for decades. It has been applied in many practical applications. …”
Get full text
Get full text
Thesis -
15
Enhancing problem-solving skills of novice programmers in an introductory programming course
Published 2023Article -
16
-
17
A genetic algorithm for capital budgeting problem with fuzzy parameters
Published 2010Get full text
Get full text
Conference or Workshop Item -
18
Formulating and solving stochastic truck and trailer routing problems using meta-heuristic algorithms / Seyedmehdi Mirmohammadsadeghi
Published 2015“…For solving this problem, the aforesaid algorithms have been applied. …”
Get full text
Get full text
Get full text
Thesis -
19
-
20
Double-layered hybrid neural network approach for solving mixed integer quadratic bilevel problems
Published 2010Get full text
Book chapter
