Search Results - (( _ application need algorithm ) OR ( some applications ((rsa algorithm) OR (tree algorithm)) ))*
Search alternatives:
- some applications »
- application need »
- need algorithm »
- tree algorithm »
- rsa algorithm »
-
1
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…The need of security to protect the data through networks has become of vital importance and critical for many sensor network applications. …”
Get full text
Get full text
Proceeding Paper -
2
-
3
Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa...
Published 2019“…Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). …”
Get full text
Get full text
Student Project -
4
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…This paper presents the issues and challenges on some key aspects of cryptanalytic attacks on RSA algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
-
6
-
7
Security issues of Novel RSA variant
Published 2022“…The RSA is one of the current default cryptosystems that provides security with applications such as encryptions and digital signatures. …”
Get full text
Get full text
Article -
8
A fast and accurate method for automatic coronary arterial tree extraction in angiograms
Published 2014“…Some techniques and algorithms are proposed for extracting coronary arteries in angiograms. …”
Get full text
Get full text
Get full text
Article -
9
-
10
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
Published 2006Get full text
Get full text
Thesis -
11
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
12
Optimizing tree planting areas through integer programming and improved genetic algorithm
Published 2012“…The algorithmic solution with some strategies mainly focuses on efficiency. …”
Get full text
Get full text
Thesis -
13
-
14
Content-based indexing of low resolution documents
Published 2016“…This approach, which is signature-based are considered for fast and efficient matching to fulfil the needs of real-time applications. The approach also has the capability to overcome the problem low resolution document such as noisy image, the environment’s varying lighting conditions and complex backgrounds. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Tree physiology optimization in constrained optimization problem
Published 2018“…Besides of good quality of performance, some metaheuristic algorithms have limitations that may deteriorate by certain degree of difficulties especially in real-world application. …”
Get full text
Get full text
Article -
16
Developing emergency application for LRT passengers with decision tree algorithm (RailAlert!) / Ezrren Natasha Baddru’l-Sham … [et al.]
Published 2023“…With geolocation and decision tree algorithms, this project aims to design and develop an emergency application for LRT passengers. …”
Get full text
Get full text
Book Section -
17
Developing emergency application for LRT passengers with decision tree algorithm (RailAlert!) / Ezrren Natasha Baddru’l-Sham … [et al.]
Published 2023“…With geolocation and decision tree algorithms, this project aims to design and develop an emergency application for LRT passengers. …”
Get full text
Get full text
Book Section -
18
Spanning Tree Transformation of Connected Graph into Single-Row Network
Published 2010Get full text
Get full text
Conference or Workshop Item -
19
A true random number generator for crypto embedded systems
Published 2006“…Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES. …”
Get full text
Get full text
Article -
20
