Search Results - (( java implementation rsa algorithm ) OR ( using computational agent algorithm ))
Search alternatives:
- java implementation »
- computational agent »
- implementation rsa »
- agent algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Agent-based extraction algorithm for computational problem solving
Published 2015“…Four agents have been proposed as an agent based model for CPS, which are User_Agent, PAC_Agent, IPO_Agent and Algorithm_Agent. …”
Get full text
Get full text
Thesis -
7
Improved rsync algorithm to minimize communication cost using multi-agent systems for synchronization in multi-learning management systems
Published 2017“…This algorithm involves several agents, such as: initiator, sense_agent (SA), log_agent (LA), and search_agent (SeA). …”
Get full text
Get full text
Get full text
Thesis -
8
-
9
Immune Multi agent System for Network Intrusion Detection using Non- linear Classification Algorithm
Published 2010Get full text
Get full text
Citation Index Journal -
10
-
11
-
12
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000Get full text
Get full text
Thesis -
13
Modeling of static and dynamic components of bio-nanorobotic systems
Published 2012“…In addition, a graph algorithm based on greedy methods is employed to compute a new set of optimal weighted electronic properties of the fullerenes via computing their Minimum Weight Spanning Trees (MWSTs). …”
Get full text
Get full text
Thesis -
14
Applying Firefly Algorithm in Finding Optimized Path in PCB Holes Drilling Process
Published 2011Get full text
Get full text
Proceeding -
15
-
16
Decentralized traffic signal control for grid traffic network using genetic algorithm
Published 2019“…This work aims to explore the potential to minimize traffic congestion using a non-deterministic algorithm. Conventionally, the deterministic algorithm such as fuzzy logic was proposed as the computational algorithm to compute the optimum traffic signal timing for minimizing vehicles in queue and travel delay. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
17
-
18
An Analysis on the Number of Agents Towards the Performance of the Simulated Kalman Filter Optimizer
Published 2018Get full text
Get full text
Conference or Workshop Item -
19
Development of gene motif modulation for information processing in artificial DNA computing
Published 2014“…In the artificial DNA computing model, the MAS (Multi-Agent System) algorithm depicts the sender agent transmits moleware information through the control agent which is then converted to binary data as input to the receiver agent. …”
Get full text
Get full text
Get full text
Proceeding Paper -
20
