Search Results - (( based evaluation rsa algorithm ) OR ( based communication system algorithm ))*
Search alternatives:
- based communication »
- based evaluation »
- system algorithm »
- evaluation rsa »
- rsa algorithm »
-
1
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…Many past studies proposed fingerprint template protection (FTP) using chaotic-based encryption algorithms that are more suitable to secure images than conventional encryption such as DES, AES, and RSA. …”
Get full text
Get full text
Get full text
Article -
2
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…At the time of writing this thesis, AAḃ algorithm still exists as a mathematical concept and proven in a mathematical based software. …”
Get full text
Get full text
Thesis -
3
Performance evaluation of lightweight Crypto functions for Internet of things applications
Published 2020“…The conventional cryptography methods, such for Advanced Encryption Standard (AES), Secure Hash Algorithm (SHA) and Rivest–Shamir–Adleman, (RSA), work well on systems which have reasonable processing power and memory capabilities. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis
Published 2024“…As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. …”
Get full text
Get full text
Get full text
Article -
5
Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis
Published 2024“…As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. …”
Get full text
Get full text
Get full text
Article -
6
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
7
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…It provides a systematic overview of major post-quantum cryptographic families, including lattice-based, hash-based, code-based, multivariate, and isogeny-related schemes, and evaluates their current security assumptions, practical efficiency, and readiness for real-world deployment. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
A reduced τ-adic Naf (RTNAF) representation for an efficient scalar multiplication on Anomalous Binary Curves (ABC)
Published 2014“…Elliptic curve cryptosystems (ECC) provides better security for each bit key utilized compared to the RSA cryptosystem. For this reason, it is projected to have more practical usage than the RSA. …”
Get full text
Get full text
Get full text
Article -
9
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
10
CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK
Published 2023“…Smart grid is an evolution from conventional power grid in which power communication system has migrated from one-way to bi-directional communication network. …”
text::Thesis -
11
Quaternion-based dynamic algorithm for random generation of solid 4D cylindrical curves in RVE modeling
Published 2025“…A quaternion‐based dynamic algorithm is developed to populate Representative Volume Elements (RVEs) with solid 4D cylindrical fibers, combining spatial centerline coordinates (x,y,z) and quaternion‐encoded orientation. …”
Get full text
Get full text
Get full text
Article -
12
An analysis of low complexity of 5G-MIMO communication system based CR using hybrid filter detection
Published 2022“…Thus, a 5G-MIMO based CR communication system has been developed to enhance the spectrum by employing a spectrum sensing (SS) algorithm. …”
Get full text
Get full text
Article -
13
Performance of MIMO space-time coded system and training based channel estimation for MIMO-OFDM system
Published 2006“…Secondly, it has focused on training based channel estimation algorithm for MIMO-OFDM system. …”
Get full text
Get full text
Thesis -
14
Modem Recognition Algorithm for Software Defined Radio Base Station
Published 2004“…The proposed algorithm was developed based on 8th order statistical moment and the technique was chosen based on the research work done by Keith et al [15]. …”
Get full text
Get full text
Thesis -
15
Embedded Ethernet System For Real-Time Communication
Published 2018Get full text
Get full text
Monograph -
16
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024“…This study proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
Article -
17
Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff
Published 2021“…In this thesis, the second part of chaos-based secure communication is introducing a new encryption algorithm to improve the security of modern chaos-based communication systems. …”
Get full text
Get full text
Get full text
Thesis -
18
Improving robot Darwinian particle swarm optimization using quantum-behaved swarm theory for robot exploration and communication / Duaa Mehiar
Published 2021“…The quantum computing theory has several advantages that can improve the searching capabilities of PSO-based algorithms. However, there has yet an attempt to adopt quantum behaviour onto robot-based system such as the RDPSO. …”
Get full text
Get full text
Get full text
Thesis -
19
Investigation of gateway placement optimization approaches in wireless mesh networks using genetic algorithms
Published 2014“…Recently wireless mesh networks (WMNs) gained significant roles in the current communication technologies and have been used in numerous applications such as transportation systems, rescue systems, Surveillance systems, community and neighborhood networking and etc. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…The prototype of SEM is constructed based on the modern Smart Meter design and modified with additional control devices and sensors, so that it can measure, record and transfer the data using designated algorithm combining three types of communication system in one device; Wi-Fi, GSM and RF. …”
Get full text
Get full text
Thesis
