Search Results - (( java implementing digital algorithm ) OR ( java implementation drops algorithm ))*
Search alternatives:
- implementing digital »
- implementation drops »
- java implementation »
- java implementing »
-
1
Provider independent cryptographic tools
Published 2003“…The library consists of cryptographic algorithms that include symmetric and asymmetric encryptions, key exchange, hashing algorithms and digital signature algorithms. …”
Get full text
Get full text
Get full text
Monograph -
2
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
3
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Route Optimization System
Published 2005“…I will be concentrating on finding the best algorithm for calculating the shortest distance between two points on a digital map. …”
Get full text
Get full text
Final Year Project -
5
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
6
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis -
7
Biometrics electronic purse
Published 1999“…A proto-type of the proposed Biometrics Electronic Purse (BEP) was build using the Schlumberger Cyberflex Multi8K Java Card with a simple File Management Utilities software to upload download biometrics template to/&om the Java Card.…”
Get full text
Get full text
Get full text
Proceeding Paper -
8
Secure E-Voting With Blind Signature
Published 2003“…In this system, voter’s privacy is guaranteed by using a blind signature for confidentiality and voter’s digital signature for voter’s authentication. E-Voting is implemented by employing Java socket technology and BouncyCastle cryptography provider. …”
Get full text
Get full text
Conference or Workshop Item -
9
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
10
