Search Results - (( web applications rsa algorithm ) OR ( wave application solar algorithm ))*

  • Showing 1 - 4 results of 4
Refine Results
  1. 1

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and systems as well as web servers and browsers to secure web traffic. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Development of an automated detector and counter for bagworm census by Ahmad, Mohd Najib

    Published 2020
    “…There are several recommendations from this study that have been suggested including the use of hyperspectral imaging to detect bagworms, application of radio frequency to detect live bagworms, open system detection of the bagworms, application of pseudo colour concept and method to detect early stage of bagworm attack.…”
    Get full text
    Get full text
    Thesis