Search Results - (( variable create path algorithm ) OR ( java application rsa algorithm ))
Search alternatives:
- java application »
- application rsa »
- path algorithm »
- rsa algorithm »
- variable »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
2
-
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Neutralisation state driven single-agent search strategy for solving constraint satisfaction problem / Saajid Akram Ahmed Abuluaih
Published 2019“…For example, the framework of solving CSP imposes a complete permutation of assignments to all remaining variables in order to derive a valid model. The author argues in this study that the problem can be neutralised and it is not necessary to perform brute-force searching all the time if a search strategy could have guided the process to the level where the values of the remaining variables can be determined implicitly, creating what the author calls Solo-Path of assignments in the problem search tree.…”
Get full text
Get full text
Thesis -
7
A Novel Triangular-Based Estimation Technique for Bezier Curve Control Points Generation on Autonomous Vehicle Path Planning at the Roundabout Intersection
Published 2023“…The circular path is likewise created using Bezier curve allowing the path to follow the contour of the roundabout. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Cyber hygiene during Covid-19 to avoid cyber attacks
Published 2022“…After received the responds from participants, we had run the analysis on all the variables by using SmartPLS 3.3 and calculate the PLS-SEM algorithm of the variables. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
