Search Results - (( java implementation rsa algorithm ) OR ( using constructs trust algorithm ))

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Does organizational culture matter in the relationship between trust and SMEs performance by Gorondutse, Abdullahi Hassan, Abdullah, Haim Hilman

    Published 2018
    “…Findings – The research findings were established using SmartPLS Algorithm and bootstrapping functions. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Effect of business social responsibility (BSR) on performance of SMEs in Nigeria by Gorondutse, Abdulahi Hassan

    Published 2014
    “…This study used purposive sampling for sample selection. Partial Least Squares (PLS) algorithm and bootstrap techniques were used to test the study‘s hypotheses. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Modified quasi-Newton type methods using gradient flow system for solving unconstrained optimization by Yap, Chui Ying

    Published 2016
    “…We investigate the possible use of control theory, particularly theory on gradient ow system to derive some modified line search and trust region methods for optimization. …”
    Get full text
    Get full text
    Thesis
  9. 9

    An enhanced cluster head selection algorithm for routing in mobile AD-HOC network by Abdulsaheb, Ghaida Muttasher

    Published 2017
    “…This thesis proposes an algorithm for increasing the stability of the cluster by selecting the most stable cluster head, maintaining the cluster structure with minimum maintenance overhead, and finding the best performance routing algorithm for use over MANET. …”
    Get full text
    Get full text
    Thesis
  10. 10

    FACTORS INFLUENCING THE INTENTION TO ADOPT E-WALLET: A REGIONAL DISTRIBUTION PERSPECTIVE IN MALAYSIA by Liew, Vernon, Poh, Phaik See

    Published 2022
    “…Based on parameters of two tailed test with confidence interval of 95% (significance level 0.05), a total of 400 responses were analysed via SmartPLS with PLS-SEM algorithm. Knowledge, perceived ease of use, perceived usefulness, and the mediating effect of perceived trust on knowledge were found significant. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Enhancement of Security Architecture for Smartcard Based Authentication Protocols by Mohammed, Lawan Ahmed

    Published 2004
    “…The general approach uses trusted devices (specifically smartcards) to provide an area of secure processing and storage. …”
    Get full text
    Get full text
    Thesis