Search Results - (( based application ((rsa algorithm) OR (cell algorithm)) ) OR ( its application a algorithm ))*
Search alternatives:
- based application »
- its application »
- cell algorithm »
- rsa algorithm »
- application a »
- a algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…At the time of writing this thesis, AAḃ algorithm still exists as a mathematical concept and proven in a mathematical based software. …”
Get full text
Get full text
Thesis -
3
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…Cryptography is the science of hiding information and its applications include ATM cards, computer passwords and electronic commerce in this modern world. …”
Get full text
Get full text
Research Reports -
4
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
Get full text
Get full text
Get full text
Article -
5
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
6
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
7
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
8
CHAOS AND PUBLIC KEY INFRASTRUCTURE (PKI)
Published 2004Get full text
Get full text
Final Year Project -
9
-
10
-
11
Developing a secure mechanism for Bluetooth-based Wireless Personal Area Networks (WPANs)
Published 2007“…Our work involves developing a prototype for Bluetooth systems using RSA and DSA encryption algorithms. …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Reduced Galloping Column Algorithm For Memory Testing
Published 2015Get full text
Get full text
Thesis -
14
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
15
Inter-cell and intra-cell facility layout models under different demand environments in cellular manufacturing systems
Published 2012“…The model minimizes both inter-cell and intra-cell material handling cost. To solve the model, an algorithm based on Simulated Annealing (SA) is developed in C/C++ namely SA1. …”
Get full text
Get full text
Thesis -
16
-
17
PREDICTIVE MAXIMUM POWER POINT TRACKING (MPPT) ALGORITHM FOR PERMANENT EXCHANGE MEMBRANE FUEL CELL (PEMFC)
Published 2022“…In this project, a PEMFC has been chosen due to its striking features that is suitable for stationary applications like residential and transportation uses. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
18
-
19
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
20
Digital Certificate-based Authentication Model For Enhanced Smartphone Security
Published 2025journal::journal article
