Search Results - (( java implementation rsa algorithm ) OR ( using rational machine algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- machine algorithm »
- rational machine »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
-
7
Evaluating the effectiveness of time-domain features for motor imagery movements using SVM
Published 2012Get full text
Get full text
Get full text
Proceeding Paper -
8
Real-time interpolator of CNC parametric curves with chord-error and feed-rateconstraints
Published 2025“…The chord-error constraints comprise geometric and kinematic properties of different parametric curves, coveringbends and sharp turns. The resulting algorithm was executed both in real-time, online mode by driving the CNC machine directly, and in an offline mode by using a stored RS274/NGC G-code file. …”
Get full text
Get full text
Get full text
Article -
9
Stemming Hausa text: using affix-stripping rules and reference look-up
Published 2016“…Unfortunately, no algorithm has been used to stem text in Hausa, a Chadic language spoken in West Africa. …”
Get full text
Get full text
Get full text
Article -
10
Stemming Hausa text: using affix-stripping rules and reference look-up
Published 2016“…Unfortunately, no algorithm has been used to stem text in Hausa, a Chadic language spoken in West Africa. …”
Get full text
Get full text
Article -
11
Development of appoinment scheduling agent using distributed constraint satisfaction (DisCS)
Published 2008“…The design of the system architecture is illustrated using Unified Modeling Language (UML) technique.…”
Get full text
Get full text
Get full text
Monograph
