Search Results - (( tender evaluation method algorithm ) OR ( user identification rsa algorithm ))*
Search alternatives:
- user identification »
- identification rsa »
- tender evaluation »
- method algorithm »
- rsa algorithm »
-
1
RSA authentication mechanisms in control grid computing environment using Gridsim toolkit
Published 2015“…In order to satisfy the security need of grid computing environment, we design an alternative authentication mechanism using RSA algorithm to ensure the user identification, and carry out the experiment in the Gridsim toolkit simulator.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Development of Fuzzy Multi-Criteria Analysis Method for Tender Cleaning Service Selection
Published 2017Get full text
Get full text
Final Year Project
