22 results on '"Mohammad A. Budiman"'
Search Results
2. Effect of sintering temperature on composite hollow fibre membrane derived from hydroxyapatite cow bone and kaolin
3. Application of A-Star Algorithm on Pathfinding Game
4. On using Euler’s Factorization Algorithm to Factor RSA Modulus
5. On Using The First Variant of Dependent RSA Encryption Scheme to Secure Text: A Tutorial
6. Combination of Rail Fence Cipher Algorithm and Least Significant Bit Technique to Secure the Image File
7. Comparison Of RSA Algorithm & Hybrid RSA-OTP Algorithm For Image Security
8. Combination of Blowfish Algorithm First of File Algorithm and End of File Algorithm on Image Security
9. Analysis of File Security with Three-Pass Protocol Scheme Using Massey-Omura Algorithm In Android
10. Super-Encryption Implementation Using Monoalphabetic Algorithm and XOR Algorithm for Data Security
11. The recognition of female voice based on voice registers in singing techniques in real-time using hankel transform method and macdonald function
12. An Implementation of RC4+ Algorithm and Zig-zag Algorithm in a Super Encryption Scheme for Text Security
13. The Implementation of Cosine Similarity to Calculate Text Relevance between Two Documents
14. Implementation of Super-Encryption with Trithemius Algorithm and Double Transposition Cipher in Securing PDF Files on Android Platform
15. Three-pass protocol scheme for bitmap image security by using vernam cipher algorithm
16. Hybrid Cryptosystem Using Tiny Encryption Algorithm and LUC Algorithm
17. An Implementation Of Elias Delta Code And ElGamal Algorithm In Image Compression And Security
18. On Using Goldbach G0 Codes and Even-Rodeh Codes for Text Compression on Using Goldbach G0 Codes and Even-Rodeh Codes for Text Compression
19. Comparison Of RSA Algorithm & Hybrid RSA-OTP Algorithm For Image Security.
20. Super-Encryption Implementation Using Monoalphabetic Algorithm and XOR Algorithm for Data Security.
21. An Implementation Of Elias Delta Code And ElGamal Algorithm In Image Compression And Security.
22. Hybrid Cryptosystem Using Tiny Encryption Algorithm and LUC Algorithm.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.