Search Results - (( java implementation rsa algorithm ) OR ( using text using algorithm ))
Search alternatives:
- java implementation »
- implementation rsa »
- using algorithm »
- rsa algorithm »
- text using »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
3
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
4
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
A new digital watermarking algorithm using combination of Least Significant Bit (LSB) and inverse bit
Published 2011“…We compare our proposed algorithm with the 1-LSB algorithm and Lee’s algorithm using Peak signal-to-noise ratio (PSNR). …”
Get full text
Get full text
Article -
7
An improved digital watermarking algorithm using combination of least significant bit (LSB) and inverse bit
Published 2012“…We compare our proposed algorithm with the 1-LSB algorithm and Lee’s algorithm and Yang's algorithm using Peak signal�to-noise ratio (PSNR). …”
Get full text
Get full text
Get full text
Thesis -
8
Text searching algorithm using boyer moore horspool (BMH) algorithm
Published 2015“…The text searching is one of the famous technique uses to find data or text from the system for faster searching. …”
Get full text
Get full text
Undergraduates Project Papers -
9
-
10
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022Get full text
Get full text
Get full text
Academic Exercise -
11
An evolutionary harmony search algorithm with dominant point detection for recognition-based segmentation of online Arabic text recognition
Published 2014“…This paper highlights a novel strategy for online Arabic text recognition using a hybrid Genetic Algorithm (GA) and Harmony Search algorithm (HS). …”
Get full text
Get full text
Article -
12
Secure encryption in network using Data Encryption Standard (DES) for high security transmission
Published 2017“…Substitution cipher is a technique of encoding where units of plain text are replaced with cipher text and XOR operator is one of the encryption process used to make the cipher text harder to decryption. …”
Get full text
Get full text
Student Project -
13
Text categorization using naive bayes algorithm
Published 2006“…This algorithm has long been used for text categorization tasks. …”
Get full text
Get full text
Conference or Workshop Item -
14
Data privacy comparison using advanced encryption standard (AES) and data encryption standard (DES) / Hikma Farah Ali
Published 2019“…Our aim is to safely to transfer the file for using the AES algorithm. Proposed algorithm has done by analysing the different time taken for both AES and DES , experiment was done by three different file sizes and also file types, such as text, image and voice to test the encryption and decryption time taken on existing algorithm DES and proposed algorithm, in conclusion, all the results of our propose algorithm shows AES takes lesser time compare to DES. …”
Get full text
Get full text
Thesis -
15
Text Categorization Using Naive Bayes Algorithm
Published 2005“…This algorithm has long been used for text categorization tasks. …”
Get full text
Get full text
Get full text
Thesis -
16
-
17
Jogging activity recognition using k-NN algorithm
Published 2022Get full text
Get full text
Get full text
Academic Exercise -
18
Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES)
Published 2022Get full text
Get full text
Get full text
Academic Exercise -
19
-
20
