Search Results - (( _ application ((rsa algorithm) OR (new algorithm)) ) OR ( its application server algorithm ))*
Search alternatives:
- application server »
- server algorithm »
- rsa algorithm »
- new algorithm »
-
1
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
-
3
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Enhance key generation algorithm based user string identity as public key
Published 2015“…This algorithm uses a user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
Get full text
Get full text
Thesis -
5
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. …”
Article -
6
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
7
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
Get full text
Get full text
Thesis -
8
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
9
-
10
-
11
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
12
New approach of cryptography algorithm for e- mail applications
Published 2005“…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
Get full text
Get full text
Conference or Workshop Item -
13
CHAOS AND PUBLIC KEY INFRASTRUCTURE (PKI)
Published 2004Get full text
Get full text
Final Year Project -
14
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
Get full text
Get full text
Thesis -
15
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
16
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The new replication process will also be used in e-commerce application to secure user transaction information. …”
Get full text
Get full text
Thesis -
17
An improved public key cryptography based on the elliptic curve
Published 2002“…To speed up the underlying finite field operations, several new algorithms are introduced namely: selecting random sparse elements algorithm, finding sparse base points, sparse multiplication over polynomial basis, and sparse multiplication over normal basis. …”
Get full text
Get full text
Thesis -
18
-
19
Encryption Technology on Windows Workstation
Published 2004Get full text
Get full text
Final Year Project -
20
New vulnerability of RSA modulus type N = p2q
Published 2017Get full text
Get full text
Get full text
Article
