Search Results - (( _ application rsa algorithm ) OR ( ((wave application) OR (web application)) server algorithm ))
Search alternatives:
- wave application »
- server algorithm »
- application rsa »
- web application »
- rsa algorithm »
-
1
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and systems as well as web servers and browsers to secure web traffic. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
A technique of dispatching algorithms for web-server cluster
Published 2011Get full text
Working Paper -
3
-
4
Adaptive System State Based Load Balancing For Web Application Server Cluster Of Heterogeneous Performance Nodes
Published 2013“…This research is to propose a new efficient DNS-based load balancing algorithms that can solve a sudden increase of demand for service requests when they are applied to a local Domain Name Service (DNS) server for Web based applications and selected services. …”
Get full text
Get full text
Get full text
Thesis -
5
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
6
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
7
Data pre-processing on web server logs for generalized association rules mining algorithm
Published 2008“…Since the pre-processing is tedious process, it depending on the algorithm and purposes of the applications.…”
Get full text
Get full text
Article -
8
-
9
Enhancement load balancing in failover web server by using HTTP-response status techniques with pfsense opensource / Muhammad Hafiz Ramli
Published 2020“…HTTP-response status techniques are used in the load balancing to ensure the web page is accessible across multiple web server. …”
Get full text
Get full text
Thesis -
10
A framework of rough cultural algorithms in optimizing mobile web caching performance
Published 2007“…The common cause of poor performance is due to the direct access to the server (e.g. pitiable performance of server-side applications or during burst crowds) and network infrastructure (e.g. long geographical distances, network overloads, etc.). …”
Get full text
Get full text
Article -
11
Soap performance enhancement for high volume messaging / Ali Baba Dauda
Published 2018“…To achieve this aim, LZ77 compression algorithm is modified to encode more symbols. The algorithm is then integrated into two Web services with HTTP and JMS bindings. …”
Get full text
Get full text
Get full text
Thesis -
12
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Web cluster load balancing via genetic-fuzzy based algorithm
Published 2007Get full text
Get full text
Get full text
Article -
14
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
15
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
16
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…This paper proposes an efficient approach to improve Rivest Shamir Adleman (RSA) algorithm using parallel technique. RSA public-key cryptosystem has been the most popular and interesting security technique for majority of applications such as internet protocols, secure internet acces and electronic commerce. …”
Get full text
Get full text
Get full text
Article -
17
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
18
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
19
-
20
Improving response time, availability and reliability through asynchronous replication technique in cluster architecture of web server cluster
Published 2010Get full text
Get full text
Conference or Workshop Item
