Search Results - (( _ application tree algorithm ) OR ( ((model application) OR (code application)) rsa algorithm ))
Search alternatives:
- model application »
- application tree »
- code application »
- tree algorithm »
- rsa algorithm »
-
1
-
2
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…Upon verification, a demonstration application prototype that performs RSA encryption and decryption is developed using Visual Basic 6.0. …”
Get full text
Get full text
Thesis -
3
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The study recommends to use another type of digital signature algorithm to be used in the proposed method. Another recommendation is to modify and optimise the python coding in the study to be more robust and suitable for real world application.…”
Get full text
Get full text
Student Project -
4
Implementation of RSA algorithm
Published 2011Get full text
Get full text
Get full text
Book Chapter -
5
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
6
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item -
7
AAβ public key cryptosystem - a comparative analysis against RSA and ECC
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
8
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…Many previous researches focused on elliptic curve and its applications in mobile communication. The purpose of the qualitative study is to explore and develop basic understanding of the properties of the families of Edwards curves, one of the special forms of elliptic curves, and their applications in cryptography, using grounded theory approach, in which the data are hand-analyzed, coded and grouped into themes under study. …”
Get full text
Get full text
Research Reports -
9
-
10
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Thesis -
11
Simulation of quantum growing network / Ong Boon Teong
Published 2003Get full text
Get full text
Thesis -
12
Digital Certificate-based Authentication Model For Enhanced Smartphone Security
Published 2025journal::journal article -
13
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
Get full text
Get full text
Thesis -
14
New approach of cryptography algorithm for e- mail applications
Published 2005“…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
Get full text
Get full text
Conference or Workshop Item -
15
Determination of tree height based on tree crown using algorithm derived from UAV imagery / Suzanah Abdullah ... [et al.]
Published 2021“…In this study, UAV technology has been taking a look at several algorithms for estimating tree height value of a single tree crown. …”
Get full text
Get full text
Conference or Workshop Item -
16
Laptop price prediction using decision tree algorithm / Nurnazifah Abd Mokti
Published 2024“…The project involves data collection, data preparation, and the implementation of the decision tree algorithm for price prediction. The decision tree's effectiveness and accuracy in predicting laptop prices are evaluated through rigorous testing and validation. …”
Get full text
Get full text
Thesis -
17
A class skew-insensitive ACO-based decision tree algorithm for imbalanced data sets
Published 2021“…Ant-tree-miner (ATM) has an advantage over the conventional decision tree algorithm in terms of feature selection. …”
Get full text
Get full text
Get full text
Article -
18
An extended ID3 decision tree algorithm for spatial data
Published 2011Get full text
Get full text
Conference or Workshop Item -
19
-
20
