Search Results - (( _ application ((rsa algorithm) OR (path algorithm)) ) OR ( iot application system algorithm ))
Search alternatives:
- system algorithm »
- iot application »
- path algorithm »
- rsa algorithm »
-
1
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
Get full text
Get full text
Thesis -
2
Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway
Published 2023“…The EECPP is composed of two algorithms: the Stop Point Prediction Algorithm using K-Means, and Path Planning Algorithm using Particle Swarm Optimization. …”
Get full text
Get full text
Get full text
Article -
3
Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT
Published 2021Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…There are security issues associated with the proliferation of IoT-connected devices, allowing IoT applications to evolve. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Efficient and scalable ant colony optimization based WSN routing protocol for IoT
Published 2020“…Routing algorithms must ensure the data transmission in an efficient way, having proper knowledge of the IoT system. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Resource-efficient coverage path planning for unmanned aerial vehicle based aerial gateway in LoRaWAN
Published 2022“…Due to finite resource, multiple issues need to be considered in designing such system, including AG flight time, coverage radius and the achievable data rate of the ground-to-air system, thus an Energy Efficient Coverage Path Planning (EECPP) algorithm has been proposed. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
A secure trust aware ACO-Based WSN routing protocol for IoT
Published 2022“…The performance of the proposed routing algorithm is demonstrated through MATLAB. Based on the proposed system, to find the secure and optimal path while aiming at providing trust in IoT environment, the average energy consumption is minimized by nearly 50% even as the number of nodes has increased, as compared with the conventional ACO algorithm, a current ant-based routing algorithm for IoT-communication, and a present routing protocol RPL for IoT.…”
Get full text
Get full text
Get full text
Article -
9
Performance evaluation of lightweight Crypto functions for Internet of things applications
Published 2020“…The conventional cryptography methods, such for Advanced Encryption Standard (AES), Secure Hash Algorithm (SHA) and Rivest–Shamir–Adleman, (RSA), work well on systems which have reasonable processing power and memory capabilities. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
A Development Of An Internet Of Things Equipped Unmanned Ground Vehicle For Surveilance Purpose
Published 2019“…In this project, the UGV combines two main elements, which are collision avoidance system (CAS), path planning system (PPS) and implementation of (IoT) for data analysing in developing an IoT equipped UGV for surveillance purpose. …”
Get full text
Get full text
Monograph -
11
Improving Network Consistency and Data Availability Using Fuzzy C Mean Clustering Algorithm in Wireless Sensor Networks
Published 2024thesis::doctoral thesis -
12
Reliable low power network protocol in IoT for agriculture field
Published 2024“…Thus, IoT systems from other industrial sectors cannot be used since they do not have the same constraints or requirements. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Robotics in Education
Published 2026“…The AI section discusses machine learning, path-planning algorithms (e.g., A* search, SLAM), and classroom case studies. …”
Get full text
Get full text
Get full text
Get full text
Book -
15
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
17
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
18
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…This paper proposes an efficient approach to improve Rivest Shamir Adleman (RSA) algorithm using parallel technique. RSA public-key cryptosystem has been the most popular and interesting security technique for majority of applications such as internet protocols, secure internet acces and electronic commerce. …”
Get full text
Get full text
Get full text
Article -
19
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
20
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project
