Search Results - (( _ application need algorithm ) OR ( some applications rsa algorithm ))*
Search alternatives:
- some applications »
- application need »
- applications rsa »
- need algorithm »
- rsa algorithm »
-
1
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…The need of security to protect the data through networks has become of vital importance and critical for many sensor network applications. …”
Get full text
Get full text
Proceeding Paper -
2
Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa...
Published 2019“…Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). …”
Get full text
Get full text
Student Project -
3
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…This paper presents the issues and challenges on some key aspects of cryptanalytic attacks on RSA algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
-
5
Security issues of Novel RSA variant
Published 2022“…The RSA is one of the current default cryptosystems that provides security with applications such as encryptions and digital signatures. …”
Get full text
Get full text
Article -
6
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
Published 2006Get full text
Get full text
Thesis -
7
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
8
A true random number generator for crypto embedded systems
Published 2006“…Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES. …”
Get full text
Get full text
Article -
9
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
Get full text
Get full text
Thesis -
10
Simulation of quantum growing network / Ong Boon Teong
Published 2003Get full text
Get full text
Thesis -
11
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Thesis -
12
Statistical selection algorithm for peer-to-peer system
Published 2008Get full text
Get full text
Get full text
Article -
13
-
14
Revisit of statistical selection algorithm for peer-to-peer system
Published 2008Get full text
Get full text
Conference or Workshop Item -
15
Healthy Lifestyle Management System
Published 2011“…The intelligent algorithm that used in this application is Rule-Based algorithm. …”
Get full text
Get full text
Final Year Project -
16
-
17
-
18
Improvement and performance analysis on statistical selection algorithms
Published 2006Get full text
Get full text
Conference or Workshop Item -
19
-
20
Optimization Of Pid Controller Using Grey Wolf Optimzer And Dragonfly Algorithm
Published 2018Get full text
Get full text
Monograph
