Search Results - (( iot applications server algorithm ) OR ( its application rsa algorithm ))
Search alternatives:
- applications server »
- iot applications »
- server algorithm »
- its application »
- application rsa »
- rsa algorithm »
-
1
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
Get full text
Get full text
Thesis -
2
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
4
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
5
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
6
-
7
Partial key attack given MSBs of CRT-RSA private keys
Published 2020“…The CRT-RSA cryptosystem is the most widely adopted RSA variant in digital applications. …”
Get full text
Get full text
Article -
8
SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems
Published 2021“…Therefore, to prevent unauthorized users from accessing fog servers, we propose a new secure and lightweight multi-factor authentication scheme for cross-platform IoT systems (SELAMAT). …”
Get full text
Get full text
Article -
9
On (unknowingly) using near-square RSA primes
Published 2022“…Since its inception, the RSA cryptosystem has become embedded in millions of digital applications with the objectives of ensuring confidentiality, integrity, authenticity, and disallowing repudiation. …”
Get full text
Get full text
Article -
10
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
Published 2023“…Internet of Things networks (IoT) are becoming very important in industrial, medical, and commercial applications. …”
Get full text
Get full text
Article -
11
-
12
Implementing server-side federated learning in an edge-cloud framework for precision aquaculture
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Home intruder detection system using machine learning and IoT
Published 2022“…The main objectives of HIDES are to create a reliable home security system with the implementation of IoT, to implement the object detection algorithm to determine the presence of humans, and to develop a smart mobile application for users to monitor their houses from anywhere in the world and be alerted if any threats are detected. …”
Get full text
Get full text
Get full text
Article -
14
Deep reinforcement learning online offloading for SWIPT multiple access edge computing network
Published 2021“…In this paper, a SWIPT-based MEC system is proposed, comprising a multi-antenna access point (AP), multiple single antenna low power IoT devices and a MEC server. The IoT devices exploit the harvested energy for either locally computing or offloading the tasks to the MEC server. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
15
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. …”
Article -
16
Process Migration-Based Computational Offloading Framework for IoT-Supported Mobile Edge/Cloud Computing
Published 2020“…The proposed framework does not require application binaries at edge servers and thus seamlessly migrates native applications. …”
Get full text
Get full text
Article -
17
Determination of suitable resource discovery tool and methodology for high-volume internet of things (IoT)
Published 2021“…Q-learning is one of the successful techniques available for the exploration of IoT nodes, but context based problems have already been established and simplified as issues of dedicated server management, IoT object data acquisition issues, and unique application requirements. …”
Get full text
Get full text
Conference or Workshop Item -
18
-
19
Process migration-based computational offloading framework for IOT-supported mobile edge/cloud computing
Published 2019“…The proposed framework does not require application binaries at edge servers and thus seamlessly migrates native applications. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…The vulnerabilities in BLE 4.2 and 5.x add an attractive perspective to the security of IoT technology. The issue of providing end-toend data protection should has been given highest priority by IoT application developer because the data in both private and public networks can be modified and disrupted by attacker. …”
Get full text
Get full text
Thesis
