Search Results - (( java implementation rsa algorithm ) OR ( using field using algorithm ))

Refine Results
  1. 1
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Indoor positioning using weighted magnetic field signal distance similarity measure and fuzzy based algorithms by Bundak, Caceja Elyca

    Published 2021
    “…This thesis analyses the positioning accuracy changes by using different similarity measures on a specific magnetic field vector and proposed an algorithm using different weighted magnetic field signal distance similarity measures. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Improved algorithms of elliptic curve point multiplication over binary and prime fields using elliptic net by Muslim, Norliana

    Published 2022
    “…The primary objective of this study is to improve the performance of ECPM algorithm of ECC using the elliptic net (EN) method in affine coordinate over binary and prime fields. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa... by Noor Hamid, Ahmad Asif Bakhtiar Noor, Nor Zailan, Nor Syazwani, Ishak, Syaza Farlisa

    Published 2019
    “…ECC can be perfonn by using either finite field or binary field. Text encryption using ECC over bina1y finite ticld, G/(2"' ) has more advantage than Ctnitc field, Gf(p) but the previous study that use ECC and EIGamal for text encryption only represent the system using Gf(p). …”
    Get full text
    Get full text
    Student Project
  9. 9
  10. 10

    Development of some fast and efficient methods for elliptic curve scalar multiplication over prime fields by Al-Saffar, Najlae Falah Hameed

    Published 2015
    “…The proposed algorithm using NAF to represent the scalar in ECSM reduced the cost of computation of the ECSM by comparing with using the binary and NAF algorithm respectively. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Inverse problem: comparison between linear back-projection algorithm and filtered back-projection algorithm in soft-field tomography by Yasmin, Abdul Wahab, Ruzairi, Abdul Rahim, Fazalul, Rahiman, Suzzana, Ridzuan Aw, Fazlul Rahman, Mohd Yunus, Jaysuman, Pusppanathan, Nor Muzakkir , Nor Ayob, Leow, Pei Ling

    Published 2017
    “…The objectives of this paper are: (1) to compare the result from LBP and FBP algorithm in soft-field tomography, and (2) to investigate the effect of FBP algorithm to a reconstructed image in soft-field tomography. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14
  15. 15

    New algorithm for evaluation of electric fields due to indirect lightning strike by Izadi, Mahdi, Ab Kadir, Mohd Zainal Abidin

    Published 2010
    “…In addition, this proposed algorithm can also be used to evaluate the effect at the far distance cases of observation point from lightning channel.…”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Evaluation of Lightning Current Using Inverse Procedure Algorithm. by Ab Kadir, Mohd Zainal Abidin, Izadi, Mahdi, Askari, Mohamad Tolou, Hajikhani, Maryam

    Published 2013
    “…In this study an inverse procedure algorithm is proposed in the time domain to evaluate lightning return stroke current based on measured electromagnetic fields at an observation point. …”
    Get full text
    Get full text
    Article
  18. 18

    The improvement of Item-based collaborative filtering algorithm in recommendation system using similarity index by Yao, Ma

    Published 2022
    “…The performance of enhanced algorithm was compared to existing collaborative filtering algorithms in term of precision rate, recall rate and F1 score using Movielens dataset. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Efficient Bayesian spatial prediction with mobile sensor networks using Gaussian Markov random fields by Xu, Y., Choi, J., Dass, S., Maiti, T.

    Published 2013
    “…From a Bayesian perspective, we design a sequential prediction algorithm to exactly compute the predictive inference of the random field. …”
    Get full text
    Get full text
    Article
  20. 20

    Efficient Bayesian spatial prediction with mobile sensor networks using Gaussian Markov random fields by Xu, Y., Choi, J., Dass, S., Maiti, T.

    Published 2013
    “…From a Bayesian perspective, we design a sequential prediction algorithm to exactly compute the predictive inference of the random field. …”
    Get full text
    Get full text
    Article