Search Results - (( _ application ((a algorithm) OR (based algorithm)) ) OR ( some applications rsa algorithm ))*
Search alternatives:
- some applications »
- applications rsa »
- rsa algorithm »
- a algorithm »
-
1
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
3
A true random number generator for crypto embedded systems
Published 2006“…Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES. …”
Get full text
Get full text
Article -
4
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
Published 2006Get full text
Get full text
Thesis -
5
-
6
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
Get full text
Get full text
Thesis -
7
Security issues of Novel RSA variant
Published 2022“…The RSA is one of the current default cryptosystems that provides security with applications such as encryptions and digital signatures. …”
Get full text
Get full text
Article -
8
Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa...
Published 2019“…Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). …”
Get full text
Get full text
Student Project -
9
Simulation of quantum growing network / Ong Boon Teong
Published 2003Get full text
Get full text
Thesis -
10
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security.…”
Get full text
Get full text
Proceeding Paper -
11
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Thesis -
12
Adaptive beamforming algorithm based on Simulated Kalman Filter
Published 2017“…A modified version of the SKF algorithm, named Opposition-Based SKF (OBSKF), introduced by K. …”
Get full text
Get full text
Thesis -
13
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…There are several block-matching algorithm based on block-based motion estimation techniques have been developed. …”
Get full text
Get full text
Get full text
Book Chapter -
14
IMPLEMENTATION OF GRAPH BASED PATH PLANNING ALGORITHMS FOR INDOOR NAVIGATION
Published 2018“…Thus, the A* algorithm is implemented in a small mobile robot, this is to see its effectiveness in real world application. …”
Get full text
Get full text
Final Year Project -
15
A study of density-grid based clustering algorithms on data streams
Published 2011Get full text
Get full text
Conference or Workshop Item -
16
-
17
A simulation based fly optimisation algorithm for swarms of mini autonomous surface vehicles application
Published 2011“…Present paper intends to provide a detailed description of a new bio-inspired Metaheuristic Algorithm. …”
Get full text
Get full text
Get full text
Article -
18
-
19
A novel scheduling algorithm based on game theory and multicriteria decision making in LTE network
Published 2015“…On the second level, TOPSIS algorithm allocates the resources among application's users based on their criteria and the application's preferences. …”
Get full text
Get full text
Get full text
Article -
20
Multi-objective spiral dynamic algorithms-based for a better accuracy and diversity
Published 2019“…This thesis presents two variants of multi-objective type algorithms based on a Spiral Dynamic Algorithm (SDA) with application to optimize a Proportional-Derivative (PD) controller for an Inverted Pendulum System. …”
Get full text
Get full text
Thesis
