Search Results - (( java application stemming algorithm ) OR ( data interpolating rsa algorithm ))
Search alternatives:
- application stemming »
- stemming algorithm »
- data interpolating »
- interpolating rsa »
- java application »
- rsa algorithm »
-
1
A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata
Published 2019“…Secret Sharing technique is used to generate Fake Asymmetric Keys by using LaGrange Polynomial Interpolation formula and RSA algorithm. Secured communication is achieved where the notion of plausible deniability is successfully implemented by fusing the processes of theorem's verification and data's validation in the protocol construction methodology.…”
Get full text
Get full text
Thesis
