Search Results - (( _ application need algorithm ) OR ( some applications ((rsa algorithm) OR (new algorithm)) ))*
Search alternatives:
- some applications »
- application need »
- need algorithm »
- rsa algorithm »
- new algorithm »
-
1
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…The need of security to protect the data through networks has become of vital importance and critical for many sensor network applications. …”
Get full text
Get full text
Proceeding Paper -
2
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
3
Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa...
Published 2019“…Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). …”
Get full text
Get full text
Student Project -
4
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…This paper presents the issues and challenges on some key aspects of cryptanalytic attacks on RSA algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
HISEC: a new lightweight block cipher algorithm
Published 2014“…Lightweight block cipher algorithms are vital for constrained environment. There are many applications need secured lightweight block cipher algorithm like credit card, E-passport and etc. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
An Efficient Computational Algorithm for Solving Arbitrary Sylvester Matrix Equations in Fuzzy Control Theory (S/O 14179)
Published 2021“…With that, the constructed algorithm is considered as a new contribution to the application of control system theory…”
Get full text
Get full text
Monograph -
7
-
8
Cryptography: A New Approach of Classical Hill Cipher
Published 2013Get full text
Get full text
Article -
9
Performance evaluation of PID controller optimisation for wheel mobile robot using Bat based optimisation algorithm
Published 2022“…In this study, a new proposed hybrid optimization algorithm, called Extended Bat Algorithm (EBA) is used for optimizing the PID controller for the wheel mobile robot. …”
Get full text
Get full text
Book Chapter -
10
-
11
Iterative methods for solving split common fixed point problems in Hilbert spaces
Published 2016“…Our interest here is to apply these mappings to propose some algorithms for solving split common fixed point problems and its variant forms, in the end, we prove the convergence results of these algorithms. …”
Get full text
Get full text
Get full text
Thesis -
12
New Cryptographic Algorithms for Enhancing Security of Voice Data
Published 2010“…The proposed solution was implemented and tested and the results showed that the required time for the security processes is minimized compared to some known algorithms such as AES_Rijndael algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Weed recognition based on erosion and dilation segmentation algorithm
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Efficient prime-based method for interactive mining of frequent patterns.
Published 2011“…This is because the appropriate value depends on the type of application and expectation of the user. Moreover, in some real-time applications such as web mining and e-business, finding new correlations between patterns by changing the minimum support threshold is needed. …”
Get full text
Get full text
Article -
15
Security issues of Novel RSA variant
Published 2022“…The RSA is one of the current default cryptosystems that provides security with applications such as encryptions and digital signatures. …”
Get full text
Get full text
Article -
16
-
17
-
18
Fsm-Based Enhanced March C- Algorithm For Memory Built-In Self-Test
Published 2017Get full text
Get full text
Thesis -
19
-
20
Identification of non-linear dynamic systems using fuzzy system with constrained membership functions
Published 2004“…Main research directions in this field include the complexity reduction of fuzzy models models, structure identification of fuzzy system, and application of new or improved training algorithms. …”
Get full text
Get full text
Get full text
Thesis
