Search Results - (( _ application ((new algorithm) OR (rsa algorithm)) ) OR ( web application tree algorithm ))
Search alternatives:
- application tree »
- web application »
- tree algorithm »
- new algorithm »
- rsa algorithm »
-
1
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Enhance key generation algorithm based user string identity as public key
Published 2015“…This algorithm uses a user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
Get full text
Get full text
Thesis -
3
Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
5
A Data Mining Approach to Construct Graduates Employability Model in Malaysia
Published 2024Get full text
journal::journal article -
6
-
7
-
8
-
9
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The rapid growth of Web 2.0 applications, such as blogs and social networks creates rich online information and provides various new sources of knowledge. …”
Get full text
Get full text
Thesis -
10
Car dealership web application
Published 2022“…Thus, explainable AI and AI monitoring become the integral components for any new development of commercial applications, including used car dealership web application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
12
New approach of cryptography algorithm for e- mail applications
Published 2005“…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
Get full text
Get full text
Conference or Workshop Item -
13
CHAOS AND PUBLIC KEY INFRASTRUCTURE (PKI)
Published 2004Get full text
Get full text
Final Year Project -
14
-
15
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
Get full text
Get full text
Thesis -
16
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
17
An improved public key cryptography based on the elliptic curve
Published 2002“…To speed up the underlying finite field operations, several new algorithms are introduced namely: selecting random sparse elements algorithm, finding sparse base points, sparse multiplication over polynomial basis, and sparse multiplication over normal basis. …”
Get full text
Get full text
Thesis -
18
Encryption Technology on Windows Workstation
Published 2004Get full text
Get full text
Final Year Project -
19
New vulnerability of RSA modulus type N = p2q
Published 2017Get full text
Get full text
Get full text
Article -
20
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
Published 2013Get full text
Get full text
Conference or Workshop Item
