Search Results - (( _ application ((rsa algorithm) OR (new algorithm)) ) OR ( based education based algorithm ))*
Search alternatives:
- education based »
- rsa algorithm »
- new algorithm »
-
1
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Enhance key generation algorithm based user string identity as public key
Published 2015“…This algorithm uses a user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
Get full text
Get full text
Thesis -
3
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
4
-
5
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
6
New approach of cryptography algorithm for e- mail applications
Published 2005“…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
Get full text
Get full text
Conference or Workshop Item -
7
CHAOS AND PUBLIC KEY INFRASTRUCTURE (PKI)
Published 2004Get full text
Get full text
Final Year Project -
8
E4ML: Educational Tool for Machine Learning
Published 2003Get full text
Get full text
Conference or Workshop Item -
9
Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation
Published 2023Subjects:Conference paper -
10
-
11
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
Get full text
Get full text
Thesis -
12
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
13
An improved public key cryptography based on the elliptic curve
Published 2002“…To speed up the underlying finite field operations, several new algorithms are introduced namely: selecting random sparse elements algorithm, finding sparse base points, sparse multiplication over polynomial basis, and sparse multiplication over normal basis. …”
Get full text
Get full text
Thesis -
14
Encryption Technology on Windows Workstation
Published 2004Get full text
Get full text
Final Year Project -
15
New algorithm for listing all permutations
Published 2010Get full text
Get full text
Get full text
Article -
16
-
17
A Data Mining Approach to Construct Graduates Employability Model in Malaysia
Published 2024Get full text
journal::journal article -
18
New vulnerability of RSA modulus type N = p2q
Published 2017Get full text
Get full text
Get full text
Article -
19
Algorithm animation for cryptanalysis of caesar and hill ciphers / Sapiee Haji Jamel and Giuseppina Sherry Sayan
Published 2009“…This new trend gives an advantage to cryptanalyst since types of algorithm(s) used are no longer a secret. …”
Get full text
Get full text
Get full text
Article -
20
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
Published 2017“…In terms of the applications, The DCFP is more suitable to be used for education applications, while the SNBR is a good algorithm designed to be used for rescue system as data and energy is the main concern. …”
Get full text
Get full text
Get full text
Thesis
