Search Results - (( program using random algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- random algorithm »
- java application »
- application rsa »
- program using »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Self-similar network traffic using Random Midpoint Displacement (RMD) algorithm / Jumaliah Saarini
Published 2006“…The way to solve this problem, we applied the existed method in visual C++ programming with used the Random midpoint Displacement (RMD) algorithm. …”
Get full text
Get full text
Student Project -
7
Security analysis of blowfish algorithm
Published 2013“…C++ is used in the implementation of the blowfish algorithm; MATLAB programming (Mathworks, R., 2012a) is used in the implementation of avalanche effect and correlation coefficient.…”
Get full text
Get full text
Conference or Workshop Item -
8
Security analysis of blowfish algorithm
Published 2013“…Blowfish algorithm (BA) is a symmetric block cipher with a 64-bit block size and variable key lengths from 32 bits up to a maximum of 448 bits.In order to measure the degree of security of blowfish algorithm, some cryptographic tests must be applied such as randomness test, avalanche criteria and correlation coefficient.In this paper we attempt to analyze the security of blowfish using avalanche criteria and correlation coefficient.We analyzed the randomness of the Blowfish output in an earlier paper titled “Randomness Analysis on Blowfish Block Cipher using ECB and CBC Modes”. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
-
10
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
11
-
12
A random search based effective algorithm for pairwise test data generation
Published 2011“…Java program has been used to test the performance of the algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…As a result, 16 permissions and 31 API calls that are most related with mobile botnet have been extracted using feature selection and later classified and tested using machine learning algorithms. …”
Proceedings Paper -
14
-
15
Automated path testing using the negative selection algorithm
Published 2017“…The proposed algorithm has been applied to the most commonly used benchmarking program which is triangle classifier. …”
Get full text
Get full text
Indexed Article -
16
Analysis the components of SNOW 3G and ZUC ciphers in mobile systems
Published 2018“…Software programs of these ciphers and NIST (SP 800-22) tests adopted to assess the randomness properties. …”
Get full text
Get full text
Get full text
Article -
17
Optimized processing of satellite signal via evolutionary search algorithm
Published 2000“…Using a different initial point, all of them produced the correct results …”
Get full text
Get full text
Article -
18
A filtering algorithm for efficient retrieving of DNA sequence
Published 2009“…An automaton-based algorithm is used to develop the filtering process proposed. …”
Get full text
Get full text
Get full text
Article -
19
-
20
GPS boundary navigation of DrosoBots using MATLAB simulation
Published 2010“…The results from the experiment show that the Levy flight algorithm is more suitable to be used compared to normal random. …”
Get full text
Get full text
Proceeding Paper
