Search Results - (( java application rsa algorithm ) OR ( _ application study algorithm ))
Search alternatives:
- application study »
- java application »
- application rsa »
- rsa algorithm »
-
1
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
2
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
3
-
4
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
6
Pashto language stemming algorithm
Published 2015“…The result of the study shows that the proposed algorithm has the accuracy of 87%. …”
Get full text
Get full text
Get full text
Article -
7
Hybrid of swarm intelligent algorithms in medical applications
Published 2019Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
-
9
Compiler-based prefetching algorithm for recursive data structure
Published 2007“…The results from the comparative study and lab experiment give the best algorithm which is guide to design the proposed algorithm. …”
Get full text
Get full text
Get full text
Thesis -
10
Schelkunoff array synthesis methods using adaptive-iterative algorithm
Published 2003“…The adaptive-iterative algorithm is an error-reduction algorithm that has been extensively studied in recent years. …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
-
13
-
14
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Here, the reason of choosing ABS algorithm as the studied was also being explained. …”
Get full text
Get full text
Undergraduates Project Papers -
15
A new cryptographic algorithm based on decomposition problem in elliptic curve cryptography / Hilyati Hanina Zazali
Published 2012“…This study describes three algorithms for efficient implementations in Elliptic Curve Cryptography (ECC). …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Scheduling jobs in computational grid using hybrid ACS and GA approach
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Hybrid DE-PEM algorithm for identification of UAV helicopter
Published 2014“…It gives better results when compared with conventional PEM algorithm inside MATLAB toolboxes. Research limitations/implications – This study is applicable to only linearized state-space model. …”
Get full text
Get full text
Get full text
Article -
18
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…Overall, the study shows that the UHDS8 algorithm produces better results compared to the FUHS16 and UHDS16 algorithm. …”
Get full text
Get full text
Get full text
Book Chapter -
19
Chaotic fractal search algorithm for global optimization with application to control design
Published 2017Get full text
Get full text
Conference or Workshop Item -
20
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis
