Search Results - (( java implementation rsa algorithm ) OR ( using code mixing algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- mixing algorithm »
- rsa algorithm »
- using code »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
-
7
Performances Of Metaheuristic Algorithms In Optimizing Tool Capacity Allocations
Published 2014“…In this research, the algorithms studied includes Genetic Algorithm, Particle Swarm Optimization Algorithm, Differential Evolution Algorithm, Harmony Search Algorithm, Teaching-LearningBased Optimization Algorithm and Black Hole Algorithm. …”
Get full text
Get full text
Thesis -
8
-
9
Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari
Published 2014“…This will help to speed up the algorithm because mix column step was using high calculation and needs a lot of time to process it. …”
Get full text
Get full text
Thesis -
10
Simulation of steady mixed convection in a lid-driven cavity filled with newtonian fluid by finite volume method
Published 2019“…The resultant matrices were then solved iteratively using the Tri- Diagonal Matrix Algorithm coded in FORTRAN90. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Mixed convection in a lid-driven enclosure filled with hybrid nanofluid by finite volume method
Published 2022“…The resultant matrices were then solved iteratively using the Tri-Diagonal Matrix Algorithm coded in FORTRAN90. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Multistep block method for solving second and third order boundary value problems with Robin and mixed type boundary conditions
Published 2020“…All the computational procedures were undertaken using the C language in a Code::Blocks 16.01 cross platform. …”
Get full text
Get full text
Thesis -
13
Secure data communication using blind source separation
Published 2008“…The translated message is encrypted with a random signal by specific mixing. The encrypted message is further permutated and inserted in the image using pseudo-random sequence, which make the system more secure. …”
Get full text
Get full text
Get full text
Proceeding Paper -
14
Malware Classification and Detection using Variations of Machine Learning Algorithm Models
Published 2025“…Training and testing data in the study used a mixed model, namely data division, split model and cross validation. …”
Get full text
Get full text
Get full text
Article -
15
Sequential and parallel multiple tabu search algorithm for multiobjective urban transit scheduling problems
Published 2018“…The MTS algorithm is coded in ANSI-C language and tested on benchmark data from Mandl's Swiss Network and Mumford's larger data. …”
Get full text
Get full text
Thesis -
16
Development of a heuristic procedure for balancing mixed-model parallel assembly line type II
Published 2010“…To solve these problems, two heuristic algorithms were developed and coded in MATLAB®. The first one allocates each model to only one parallel assembly line and achieves the initial arrangement of tasks with the minimum number of workstations for each line. …”
Get full text
Get full text
Thesis -
17
Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions
Published 2023“…For each journal paper, the detailed information of the work area, targeted issue, formulation technique, optimization approach, adopted algorithms, evaluation techniques, performance matrices, dataset, utilized tools, and framework are extracted and analyzed using manual and automatic coding. …”
Get full text
Get full text
Article -
18
Photon: A new mix columns architecture on FPGA
Published 2023“…The efficient PHOTON hardware design was coded using a very high speed integrated circuit hardware description language, VHDL. …”
Article -
19
OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA
Published 2004“…Besides that, Twofish also uses a 32 bit Pseudo Hadamard Transform to mix the outputs from its 2 parallel 32-bit g functions. …”
Get full text
Get full text
Final Year Project -
20
