Search Results - (( based application rsa algorithm ) OR ( mobile applications tree algorithm ))
Search alternatives:
- mobile applications »
- based application »
- applications tree »
- application rsa »
- tree algorithm »
- rsa algorithm »
-
1
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
2
-
3
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
4
Enhance key generation algorithm based user string identity as public key
Published 2015“…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
Get full text
Get full text
Thesis -
5
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
6
Optimized routing algorithm for mobile multicast source in Wireless Mesh Networks
Published 2015“…Thus this paper proposes a Differential Evolution based optimized mobile multicast routing algorithm for the shared tree architecture. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
8
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
Get full text
Get full text
Thesis -
9
FPGA Implementation of RSA Public-Key Cryptographic Coprocessor
Published 2000Get full text
Get full text
Article -
10
-
11
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
12
Wireless sensor nodes deployment using multi-robot based on improved spanning tree algorithm
Published 2015“…One of the solutions to this problem is by using mobile robots with concern on exploration algorithm for mobile robot. …”
Get full text
Get full text
Thesis -
13
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
Get full text
Get full text
Student Project -
14
A new multicast-based architecture to support host mobility in IPv6
Published 2003Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Mobile Learning: An Application Prototype for AVL Tree Learning Object
Published 2010“…Our approach is to incorporate video clips in presenting the algorithm systematically. With this mobile learning application, student could learn at his or her own pace, anywhere anytime. …”
Get full text
Get full text
Conference or Workshop Item -
16
-
17
Mobile Learning: An Application Prototype for AVL Tree Learning Object
Published 2010“…Our approach is to incorporate video clips in presenting the algorithm systematically. With this mobile learning application, student could learn at his or her own pace, anywhere anytime. …”
Get full text
Get full text
Get full text
Article -
18
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
19
Sentiment Analysis on Users' Satisfaction for Mobile Banking Apps in Malaysia
Published 2022“…The best accuracy result shows 94.37% by the Decision Tree algorithm, and Naïve Bayes obtained the worst outcome at 66%.…”
Get full text
Get full text
Get full text
Article -
20
