Search Results - (( _ application model algorithm ) OR ( its application ((rsa algorithm) OR (new algorithm)) ))*
Search alternatives:
- application model »
- model algorithm »
- rsa algorithm »
- new algorithm »
-
1
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
2
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
3
CHAOS AND PUBLIC KEY INFRASTRUCTURE (PKI)
Published 2004Get full text
Get full text
Final Year Project -
4
-
5
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
6
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
-
8
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
Published 2013Get full text
Get full text
Conference or Workshop Item -
9
Digital Certificate-based Authentication Model For Enhanced Smartphone Security
Published 2025journal::journal article -
10
-
11
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…Thus, overall aim of this research is to introduce new grid scheduling algorithms for resource allocation as well as for job scheduling for enabling a highly efficient and effective utilization of the resources in executing various applications. …”
Get full text
Get full text
Thesis -
13
A modified generalized RBF model with EM-based learning algorithm for medical applications
Published 2006“…Moreover, GRBF trained by the new algorithm has an apparent statistical meaning. …”
Get full text
Get full text
Get full text
Proceeding Paper -
14
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
15
-
16
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
17
Enhanced algorithms for three-dimensional object interpreter
Published 2004Get full text
Get full text
Get full text
Thesis -
18
Real time nonlinear filtered-x lms algorithm for active noise control
Published 2012“…Consequently, the practical applicability of the NLFXLMS algorithm is limited by this drawback. …”
Get full text
Get full text
Thesis -
19
-
20
Implementation of repetitive control algorithm in reducing vibration using MATLAB/SIMULINK / Mohamad Zuhairy Mohamed
Published 2008“…As a new result it is in fact shown that the algorithm iteratively solves a Model Predictive Control related cost function. …”
Get full text
Get full text
Student Project
