Search Results - (( based application ((tree algorithm) OR (new algorithm)) ) OR ( _ application rsa algorithm ))
Search alternatives:
- based application »
- application rsa »
- tree algorithm »
- new algorithm »
- rsa algorithm »
-
1
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Enhance key generation algorithm based user string identity as public key
Published 2015“…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
Get full text
Get full text
Thesis -
3
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
4
-
5
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
6
CHAOS AND PUBLIC KEY INFRASTRUCTURE (PKI)
Published 2004Get full text
Get full text
Final Year Project -
7
New approach of cryptography algorithm for e- mail applications
Published 2005“…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
Get full text
Get full text
Conference or Workshop Item -
8
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
9
An extended ID3 decision tree algorithm for spatial data
Published 2011Get full text
Get full text
Conference or Workshop Item -
10
Photogrammetric unmanned aerial vehicle for digital terrain model estimation under oil palm tree canopy area / Suzanah Abdullah
Published 2021“…Following the application of a new methodology on the real site, the result indicated the consistency of DTM values of all the algorithms at different flying heights but there were relatively small differences between all the algorithms used. …”
Get full text
Get full text
Thesis -
11
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
Get full text
Get full text
Thesis -
12
An improved public key cryptography based on the elliptic curve
Published 2002“…To speed up the underlying finite field operations, several new algorithms are introduced namely: selecting random sparse elements algorithm, finding sparse base points, sparse multiplication over polynomial basis, and sparse multiplication over normal basis. …”
Get full text
Get full text
Thesis -
13
A Data Mining Approach to Construct Graduates Employability Model in Malaysia
Published 2024Get full text
journal::journal article -
14
-
15
-
16
Classification model for hotspot occurrences using spatial decision tree algorithm
Published 2013“…We improved the ID3 decision tree algorithm such that it can be utilized on spatial data in order to develop a classification model for hotspots occurrence. …”
Get full text
Get full text
Get full text
Article -
17
Optimizing tree planting areas through integer programming and improved genetic algorithm
Published 2012“…In conclusion, the hybrid algorithm based solution strategies improved efficiency with convincing results, therefore, this will assist planners for better decision making to optimize area to achieve more trees to be planted. …”
Get full text
Get full text
Thesis -
18
Parsing algorithms for grammars with regulated rewriting
Published 2011Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
-
20
E4ML: Educational Tool for Machine Learning
Published 2003Get full text
Get full text
Conference or Workshop Item
