Search Results - (( iot application need algorithm ) OR ( its application ((based algorithm) OR (rsa algorithm)) ))

Refine Results
  1. 1
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    IOT-based fertigation system / Mohamad Amir Furqan Darus by Darus, Mohamad Amir Furqan

    Published 2024
    “…The Fertigation, the precise application of water and fertilizers in agriculture, has evolved with the integration of Internet of Things (IoT) technology. …”
    Get full text
    Get full text
    Student Project
  4. 4

    Real-time time series error-based data reduction for internet-of-things applications by Wong, Siaw Ling

    Published 2018
    “…Such offline mode is not suitable for IoT applications such as monitoring, surveillance and alert system which needs to detect events at real-time. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks by Al Ahmed, Mahmoud Tayseer, Hashim, Fazirulhisyam, Hashim, Shaiful Jahari, Abdullah, Azizol

    Published 2023
    “…These cluster chains are connected by another blockchain. A new consensus algorithm based on proof of identity authentication is adapted to the limited computational capabilities of IoT devices. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection by Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…Hence, this study aims to improve the limitations found in the existing chaotic-based encryption algorithms for FTP by improving its encryption speed using Henon and Logistic map. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Thesis
  11. 11

    A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim by Kamaruddin, Nurul Azwa, Mustakim, Nurul Ain

    Published 2012
    “…Among those cryptosystems, there are three types of public key cryptographic systems that are currently considered both secure and efficient, classified according to the mathematical problems upon which they are based: the Integer Factorization Systems (of which the RSA algorithm is the most well known example), the Discrete logarithm Systems (such as the US Government’s Digital Signature Algorithm) and the Elliptic Curve Cryptosystem (ECC). …”
    Get full text
    Get full text
    Research Reports
  12. 12

    An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi by Suhaimi, Hamizan

    Published 2021
    “…This research aim is to study the performance of an improvised Genetic Algorithm (GA) by formulating its problem-specific algorithm for network intrusion problem. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16

    A review on internet of things (IoT) based water monitoring system by Malaika Shaikha, Azad Alia, Riaz Ahmed, Babar Ali Shaikh

    Published 2023
    “…The traditional method to monitor water quality and quantity has been a quite difficult task involving a large amount of labour and cash. But the IoT application slashes human involvement and most of the procedural decisions are made by algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19
  20. 20

    Selective of IoT applications for water quality monitoring in Malaysia by Zainuddin, Ahmad Anwar, Amir Hussin, Amir 'Aatieff, Annas, Ammar Haziq, Bharudin, Mohamad Syafiq Asyraf, Abdul Rajat @ Abdul Razak, Alin Farhain, Mahazir, Muhammad Nur Badri, Ahmad Puzi, Asmarani, Handayani, Dini Oktarina Dwi, Abdul Raziff, Abdul Rafiez

    Published 2024
    “…Overall, this paper proposes a comprehensive overview of IoT-based applications for water quality monitoring in Malaysia’s aquaculture with the advancements in IoT technology and its potential impact on improving water quality management practices.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article