Search Results - (( visualization implication search algorithm ) OR ( java implementation rsa algorithm ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Application Of Bibliometric Analysis on Root Growth Algorithm by Tengku Malim Busu, Tengku Nurul Aimi Balqis, Ahmad Kamaruddin, Saadi, Ahad, Nor Aishah, Md Ghani, Nor Azura, Hamid, Hashibah

    Published 2024
    “…The results of this study have significant implications for increasing the number of practices using the root growth algorithm in future research. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    The impact of Xiaohongshu as the primary information hub: a case study among utar undergraduates by Eu, Jin Hau

    Published 2025
    “…This study investigates the increasing popularity of Xiaohongshu (RedNote) as the primary information hub among Malaysian university students, indicating a behavioural shift away from traditional search engines like Google. Xiaohongshu, once a Chinese e-commerce and lifestyle platform, has transformed into a dynamic space for peer-generated content that combines community interaction, visual storytelling, and authenticity. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8
  9. 9

    Expression and association of miR-181a and miR-663 and their target genes in head and neck cancer by Masood, Yaghma

    Published 2018
    “…The precision of predictions by all the algorithms for hsa-miR-181a-2-3p and hsa-miR-663 targets was low. …”
    Get full text
    Get full text
    Thesis