Search Results - (( iot application need algorithm ) OR ( its application ((based algorithm) OR (rsa algorithm)) ))
Search alternatives:
- application need »
- iot application »
- its application »
- need algorithm »
- rsa algorithm »
-
1
-
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
IOT-based fertigation system / Mohamad Amir Furqan Darus
Published 2024“…The Fertigation, the precise application of water and fertilizers in agriculture, has evolved with the integration of Internet of Things (IoT) technology. …”
Get full text
Get full text
Student Project -
4
Real-time time series error-based data reduction for internet-of-things applications
Published 2018“…Such offline mode is not suitable for IoT applications such as monitoring, surveillance and alert system which needs to detect events at real-time. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
Get full text
Get full text
Thesis -
6
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
Published 2023“…These cluster chains are connected by another blockchain. A new consensus algorithm based on proof of identity authentication is adapted to the limited computational capabilities of IoT devices. …”
Get full text
Get full text
Article -
7
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
8
CHAOS AND PUBLIC KEY INFRASTRUCTURE (PKI)
Published 2004Get full text
Get full text
Final Year Project -
9
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…Hence, this study aims to improve the limitations found in the existing chaotic-based encryption algorithms for FTP by improving its encryption speed using Henon and Logistic map. …”
Get full text
Get full text
Get full text
Article -
10
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
11
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…Among those cryptosystems, there are three types of public key cryptographic systems that are currently considered both secure and efficient, classified according to the mathematical problems upon which they are based: the Integer Factorization Systems (of which the RSA algorithm is the most well known example), the Discrete logarithm Systems (such as the US Government’s Digital Signature Algorithm) and the Elliptic Curve Cryptosystem (ECC). …”
Get full text
Get full text
Research Reports -
12
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…This research aim is to study the performance of an improvised Genetic Algorithm (GA) by formulating its problem-specific algorithm for network intrusion problem. …”
Get full text
Get full text
Thesis -
13
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
15
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
16
A review on internet of things (IoT) based water monitoring system
Published 2023“…The traditional method to monitor water quality and quantity has been a quite difficult task involving a large amount of labour and cash. But the IoT application slashes human involvement and most of the procedural decisions are made by algorithms. …”
Get full text
Get full text
Get full text
Article -
17
-
18
-
19
-
20
Selective of IoT applications for water quality monitoring in Malaysia
Published 2024“…Overall, this paper proposes a comprehensive overview of IoT-based applications for water quality monitoring in Malaysia’s aquaculture with the advancements in IoT technology and its potential impact on improving water quality management practices.…”
Get full text
Get full text
Get full text
Get full text
Article
