Search Results - (( program using ((rsa algorithm) OR (drops algorithm)) ) OR ( java application using algorithm ))
Search alternatives:
- java application »
- using algorithm »
- program using »
- rsa algorithm »
-
1
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
2
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
3
Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis
Published 2024“…Firstly, they examined each algorithm of the RSA variants and analysed them according to the proposed methodology. …”
Get full text
Get full text
Get full text
Article -
4
Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis
Published 2024“…Firstly, they examined each algorithm of the RSA variants and analysed them according to the proposed methodology. …”
Get full text
Get full text
Get full text
Article -
5
-
6
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The study recommends to use another type of digital signature algorithm to be used in the proposed method. …”
Get full text
Get full text
Student Project -
7
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…It is not done only by encrypting it but also providing access to the data only on successful authentication. ECC, AES, and RSA algorithms will be used to encrypt the files to enhance security data on the cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
8
Intelligent examination timetabling system using hybrid intelligent water drops algorithm
Published 2015Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Intelligent Examination Timetabling System Using Hybrid Intelligent Water Drops Algorithm
Published 2024Proceedings Paper -
10
Encryption Technology on Windows Workstation
Published 2004“…This study is done because current encryption method in Windows environment is quite weak (e.g.: Windows password) and easily breakable using program like LC4(@stake LC4, about). Windows NT, 2000 and XP use Security Accounts Manager (SAM) file to store encrypted users passwords using RSA MD4 scheme(Windows NT SAM permission Vulnerability, bulletin), so if the RSA technique is enhanced it will enable a stronger and harder to break workstations. …”
Get full text
Get full text
Final Year Project -
11
Crypto Embedded System for Electronic Document
Published 2006“…The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
Get full text
Get full text
Article -
12
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
13
-
14
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
15
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
16
Congestion management based optimization technique using bee colony
Published 2023“…Tests conducted on the IEEE 30-Bus Reliability Test System for performance assessment revealed that the proposed bee algorithm technique is better than evolutionary programming technique in addressing this problem. �2010 IEEE.…”
Conference Paper -
17
-
18
Enhanced Intelligent Water Drops Algorithm for University Examination Timetabling Problems
Published 2024“…This thesis presents an investigation of using the Intelligent Water Drops (IWD) algorithm to construct and produce good quality solutions for the UETP. …”
thesis::doctoral thesis -
19
OPTIMAL CABLE SELECTION IN RADIAL DISTRIBUTION NETWORKS CONSIDERING PLANNER'S DEFINED VOLTAGE DROP LIMIT
Published 2002“…The resource of the cable inventory is also responsible for optimal selection of the cable. By using this proposed computer algorithm and program an example is solved successfully that is presented in the results.…”
Get full text
Get full text
Conference or Workshop Item -
20
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
