Search Results - (( based application rsa algorithm ) OR ( _ application ((out algorithm) OR (search algorithm)) ))
Search alternatives:
- based application »
- application rsa »
- rsa algorithm »
- out algorithm »
-
1
-
2
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
Get full text
Get full text
Thesis -
3
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Symbiotic organisms search optimization algorithm in cloud computing: a nature-inspired meta-heuristic
Published 2022“…This paper proposes to investigate symbiotic organisms search algorithms used in handling various optimisation problems in different fields to bring out strengths and weaknesses of the existing algorithms as well as to point out future directions for the upcoming studies in the domain. …”
Get full text
Get full text
Article -
5
-
6
An adaptive gravitational search algorithm for global optimization
Published 2023“…Gravitational Search Algorithm (GSA) is one of the relatively new population-based optimization algorithms. …”
Article -
7
-
8
-
9
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
10
-
11
Enhanced Harris's Hawk algorithm for continuous multi-objective optimization problems
Published 2020“…This indicates the capability of the algorithm in exploring the search space. The 2S-ENDSHHMO algorithm can be used to improve the search process of other MOSI-based algorithms and can be applied to solve MOPs in applications such as structural design and signal processing.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Enhance key generation algorithm based user string identity as public key
Published 2015“…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
Get full text
Get full text
Thesis -
13
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
14
-
15
Development of heuristic methods based on genetic algorithm (GA) for solving vehicle routing problem
Published 2008“…This research proposes the enhanced metaheuristic algorithms that exploit the power of Tabu Search, Genetic Algorithm, and Simulated Annealing for solving VRPSD. …”
Get full text
Get full text
Monograph -
16
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
17
-
18
Harmony search algorithm for curriculum-based course timetabling problem
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
19
A study of watermarking methods in medical application
Published 2004Get full text
Get full text
Thesis -
20
