Search Results - (( simultaneously implementation phase algorithm ) OR ( java implementation rsa algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A hybrid algorithm for finding shortest path in network routing. by Soltan Aghaei, Mohammad Reza, Ahmad Zulkarnain, Zuriati, Mamat, Ali, Zainuddin, Hishamuddin

    Published 2009
    “…Quantum algorithm is the fastest possible algorithm that can do several operations simultaneously due to their wave like properties. …”
    Get full text
    Article
  7. 7

    Development of committee machine models for multiple response optimization problems by Golestaneh, Seyed Jafar

    Published 2014
    “…Multiple response optimization (MRO) problems need to optimize several response variables simultaneously. Three phases are considered to solve MRO problems and they include design of experiments, modeling, and optimization. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A modified group authentication scheme for machine type communication in LTE/LTE-a networks by Ismail, Haqi Khalid

    Published 2018
    “…Meeting the necessities of control usage of devices and mass implement transmission is a key issue in the implementation of MTC in the Long Term Evolution/Long Term Evolution Advanced systems. …”
    Get full text
    Get full text
    Thesis
  9. 9

    2 MHz electrical resistance tomography for static liquid solid profile measurement by Yasmin, Abdul Wahab

    Published 2017
    “…The low frequency ERT makes use of the phase-sensitive demodulation (PSD) approach and is a complicated technique to implement. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Development of multi-objective Chaotic Immune Symbiotic Organisms Search (CISOS) algorithm for facts device installation in voltage security control / Mohamad Khairuzzaman Mohamad... by Mohamad Zamani, Mohamad Khairuzzaman

    Published 2019
    “…The study was divided into 3 phases, involving the implementation of CISOS to determine the optimal allocation of Static VAr Compensator (SVC), optimal allocation of Thyristor Controlled Series Compensator (TCSC), as well as simultaneous optimal allocation of SVC and TCSC in a power system. …”
    Get full text
    Get full text
    Thesis