Search Results - (( its application ((bee algorithm) OR (rsa algorithm)) ) OR ( web applications cloud algorithm ))
Search alternatives:
- applications cloud »
- web applications »
- its application »
- cloud algorithm »
- bee algorithm »
- rsa algorithm »
-
1
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
2
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…The result of the algorithm performance will be appeared in web application system. …”
Get full text
Get full text
Get full text
Academic Exercise -
3
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
5
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
6
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
7
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…Motivated by a number of security experts in cloud computing, we proposed an innovative solution of authentication for cloud web-based applications. …”
Get full text
Get full text
Get full text
Thesis -
8
-
9
Partial key attack given MSBs of CRT-RSA private keys
Published 2020“…The CRT-RSA cryptosystem is the most widely adopted RSA variant in digital applications. …”
Get full text
Get full text
Article -
10
Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES)
Published 2022“…Task scheduling and resource allocation are essential aspects of cloud computing. This Study proposes task scheduling in cloud computing using a hybrid genetic algorithm, and bald eagle search proposed to solve the task scheduling problem. …”
Get full text
Get full text
Get full text
Academic Exercise -
11
On (unknowingly) using near-square RSA primes
Published 2022“…Since its inception, the RSA cryptosystem has become embedded in millions of digital applications with the objectives of ensuring confidentiality, integrity, authenticity, and disallowing repudiation. …”
Get full text
Get full text
Article -
12
-
13
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Task scheduling in cloud computing environment using hybrid genetic algorithm and artificial bee colony
Published 2022“…In this project, a comparative evaluation of selected algorithms is done to ascertain their applicability, practicality, and adaptability in a cloud scenario. …”
Get full text
Get full text
Get full text
Academic Exercise -
16
-
17
Optimal design of step – cone pulley problem using the bees algorithm
Published 2021Get full text
Get full text
Get full text
Get full text
Book Chapter -
18
Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing
Published 2013“…Cloud Computing systems are widely applied in many fields such as communication data management, web application, network monitoring, financial management and so on. …”
Get full text
Thesis -
19
Data clustering using the bees algorithm
Published 2007Get full text
Get full text
Conference or Workshop Item -
20
Energy Efficient High-Performance Computing Aware Proactive Dynamic Virtual Machine Consolidation Technique in Cloud Computing
Published 2022“…High-Performance Computing (HPC) applications have gained extensive interest in cloud computing. …”
Get full text
Get full text
Get full text
Thesis
