Search Results - (( java implementation rsa algorithm ) OR ( programming using cd algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- rsa algorithm »
- cd algorithm »
- using cd »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Design And Evaluation Of A Modified Csma/Cd Mac Protocol On Single-Channel Optical Local Area Network
Published 2003“…The algorithm was developed in Visual Basic 6.0v programming language. …”
Get full text
Get full text
Thesis -
7
-
8
-
9
-
10
-
11
Fuzzy speed controller for DC motor drives
Published 2013Get full text
Get full text
Undergraduates Project Papers -
12
Moving detection using cellular neural network (CNN)
Published 2008Get full text
Get full text
Undergraduates Project Papers -
13
Prioritizing CD4 count monitoring in response to ART in resource-constrained settings: a retrospective application of prediction-based classification
Published 2012“…Conclusions: Our results support the use of PBC modeling as a triage point at the laboratory, lessening the need for laboratory-based CD4+ T cell count testing; implementation of this tool could help optimize the use of laboratory resources, directing CD4 testing towards higher-risk patients. …”
Get full text
Get full text
Get full text
Article -
14
Three-term conjugate gradient method under Armijo line search for unemployment rate in Malaysia / Muhammad Fiqhi Zulkifli
Published 2023“…Other than that, the application of CG method in regression analysis is not widely used. Thus, research is made to compare these methods by using MATLAB R2022b subroutine programming. …”
Get full text
Get full text
Thesis -
15
Image based autonomous indoor parallel parking assist on omni-directional vehicle (ODV)
Published 2016Get full text
Get full text
Undergraduates Project Papers -
16
-
17
Implementation of ump course registration system using heuristic method
Published 2012Get full text
Get full text
Undergraduates Project Papers -
18
-
19
Text messaging encryption system
Published 2012Get full text
Get full text
Undergraduates Project Papers -
20
