Search Results - (( data application ((rsa algorithm) OR (bat algorithm)) ) OR ( java application using algorithm ))

Refine Results
  1. 1
  2. 2

    Privacy in medical emergency system: cryptographic and security aspects by Hameed, Shihab A., Yuchoch, Habib, Al-Khateeb, Wajdi Fawzi Mohammed

    Published 2010
    “…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Implementation of Grid Computing for Cryptosystem (RSA) by Abd Wahab, Mohamed Ferdaus

    Published 2005
    “…The RSA algorithm can be used for both public key encryption and digital signatures. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Multi-Robot Learning with Bat Algorithm With Mutation (Bam) by Chandrathevan, Sathiamurthy

    Published 2022
    “…BAT algorithm uses echolocation technique like bats to generate bat population and random data is generated, the robot then traverses and the distance is calculated which is compared to the distance from the obstacle. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7

    A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems by Paniandi, Arul

    Published 2006
    “…This RSA co-processor core is able to encrypt and decrypt data with variable key lengths up to 4096 bits. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10
  11. 11

    Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen by Shawkat S.A., Tuama B.A., Al-Barazanchi I.

    Published 2023
    “…The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. …”
    Article
  12. 12

    Comparison between RSA hardware and software implementation for WSNs sexcurity schemes by Md. Tap, Abu Osman, Manttoro, Teddy, Alkalbani, Abdullah Said

    Published 2010
    “…The need of security to protect the data through networks has become of vital importance and critical for many sensor network applications. …”
    Get full text
    Get full text
    Proceeding Paper
  13. 13
  14. 14

    Naive bayes-guided bat algorithm for feature selection. by Taha, Ahmed Majid, Mustapha, Aida, Chen, Soong Der

    Published 2013
    “…Bio-inspired method called Bat Algorithm hybridized with a Naive Bayes classifier has been presented in this work. …”
    Get full text
    Get full text
    Article
  15. 15

    New random approaches of modified adaptive bats sonar algorithm for reservoir operation optimization problems by Nor Shuhada, Ibrahim

    Published 2024
    “…The Modified Adaptive Bats Sonar Algorithm (MABSA), initially designed for single objective optimization and inspired by colony bats' echolocation, has demonstrated efficiency with its simple structure and reduced computation time. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Naive Bayes-guided bat algorithm for feature selection by Taha A.M., Mustapha A., Chen S.-D.

    Published 2023
    “…Bio-inspired method called Bat Algorithm hybridized with a Naive Bayes classifier has been presented in this work. …”
    Article
  19. 19

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  20. 20