Search Results - (( java implementation rsa algorithm ) OR ( using electronics based algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- using electronics »
- electronics based »
- rsa algorithm »
-
1
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
2
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
3
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
4
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Binary search algorithm-based maximum power point tracking for photovoltaic system under partial shaded conditions
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item -
7
-
8
On density-based data streams clustering algorithms: A survey
Published 2017Get full text
Get full text
Get full text
Conference or Workshop Item -
9
-
10
-
11
-
12
-
13
Image Encrytion Using Block Based Transformation Algorithm
Published 2008Get full text
Get full text
Get full text
Article -
14
Image encryption algorithm based on chaotic mapping
Published 2003“…The algorithm supports two modes of operation namely Electronic Code Book (ECB) and Cipher Block Chaining (CBC). …”
Get full text
Get full text
Get full text
Article -
15
Thermoelectric cooler identification based on continuous-time hammerstein model using metaheuristics algorithm
Published 2021Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
-
17
Algorithms for extracting adjacency matrix based on Formal Concept Analysis (FCA)
Published 2017Get full text
Get full text
Conference or Workshop Item -
18
-
19
Date store management in sliding window based on-line identification algorithms
Published 2001Get full text
Get full text
Conference or Workshop Item -
20
Iteration strategy and ts effect towards the performance of population based metaheuristics
Published 2020Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
