Search Results - (( java implementation rsa algorithm ) OR ( using text using algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A new digital watermarking algorithm using combination of Least Significant Bit (LSB) and inverse bit by Bamatraf, Abdullah, Ibrahim, Rosziati, Mohd. Salleh, Mohd. Najib

    Published 2011
    “…We compare our proposed algorithm with the 1-LSB algorithm and Lee’s algorithm using Peak signal-to-noise ratio (PSNR). …”
    Get full text
    Get full text
    Article
  7. 7

    An improved digital watermarking algorithm using combination of least significant bit (LSB) and inverse bit by Abdullah Bamatraf, Abdullah Omar

    Published 2012
    “…We compare our proposed algorithm with the 1-LSB algorithm and Lee’s algorithm and Yang's algorithm using Peak signal�to-noise ratio (PSNR). …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Text searching algorithm using boyer moore horspool (BMH) algorithm by Siti Nurafiqah, Jaafar

    Published 2015
    “…The text searching is one of the famous technique uses to find data or text from the system for faster searching. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9
  10. 10
  11. 11

    An evolutionary harmony search algorithm with dominant point detection for recognition-based segmentation of online Arabic text recognition by Moayad, Yousif Potrus, Ngah, Umi Kalthum, Bestoun S. , Ahmed

    Published 2014
    “…This paper highlights a novel strategy for online Arabic text recognition using a hybrid Genetic Algorithm (GA) and Harmony Search algorithm (HS). …”
    Get full text
    Get full text
    Article
  12. 12

    Secure encryption in network using Data Encryption Standard (DES) for high security transmission by Abdullah, Nur Amila

    Published 2017
    “…Substitution cipher is a technique of encoding where units of plain text are replaced with cipher text and XOR operator is one of the encryption process used to make the cipher text harder to decryption. …”
    Get full text
    Get full text
    Student Project
  13. 13

    Text categorization using naive bayes algorithm by Wan lsmail @ W. Abdullah, Wan Hazimah, Kamaruddin, Siti Sakira, Sainin, Mohd Shamrie

    Published 2006
    “…This algorithm has long been used for text categorization tasks. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Data privacy comparison using advanced encryption standard (AES) and data encryption standard (DES) / Hikma Farah Ali by Ali, Hikma Farah

    Published 2019
    “…Our aim is to safely to transfer the file for using the AES algorithm. Proposed algorithm has done by analysing the different time taken for both AES and DES , experiment was done by three different file sizes and also file types, such as text, image and voice to test the encryption and decryption time taken on existing algorithm DES and proposed algorithm, in conclusion, all the results of our propose algorithm shows AES takes lesser time compare to DES. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Text Categorization Using Naive Bayes Algorithm by Wan Hazimah, Wan Ismail

    Published 2005
    “…This algorithm has long been used for text categorization tasks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20