Search Results - (( simultaneously implementation phase algorithm ) OR ( java implementation rsa algorithm ))
Search alternatives:
- simultaneously implementation »
- implementation phase »
- java implementation »
- implementation rsa »
- phase algorithm »
- rsa algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
A hybrid algorithm for finding shortest path in network routing.
Published 2009“…Quantum algorithm is the fastest possible algorithm that can do several operations simultaneously due to their wave like properties. …”
Get full text
Article -
7
Development of committee machine models for multiple response optimization problems
Published 2014“…Multiple response optimization (MRO) problems need to optimize several response variables simultaneously. Three phases are considered to solve MRO problems and they include design of experiments, modeling, and optimization. …”
Get full text
Get full text
Thesis -
8
A modified group authentication scheme for machine type communication in LTE/LTE-a networks
Published 2018“…Meeting the necessities of control usage of devices and mass implement transmission is a key issue in the implementation of MTC in the Long Term Evolution/Long Term Evolution Advanced systems. …”
Get full text
Get full text
Thesis -
9
2 MHz electrical resistance tomography for static liquid solid profile measurement
Published 2017“…The low frequency ERT makes use of the phase-sensitive demodulation (PSD) approach and is a complicated technique to implement. …”
Get full text
Get full text
Thesis -
10
Development of multi-objective Chaotic Immune Symbiotic Organisms Search (CISOS) algorithm for facts device installation in voltage security control / Mohamad Khairuzzaman Mohamad...
Published 2019“…The study was divided into 3 phases, involving the implementation of CISOS to determine the optimal allocation of Static VAr Compensator (SVC), optimal allocation of Thyristor Controlled Series Compensator (TCSC), as well as simultaneous optimal allocation of SVC and TCSC in a power system. …”
Get full text
Get full text
Thesis
