Search Results - (( its application ((need algorithm) OR (new algorithm)) ) OR ( _ application rsa algorithm ))*
Search alternatives:
- application rsa »
- need algorithm »
- new algorithm »
- rsa algorithm »
-
1
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
2
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
3
CHAOS AND PUBLIC KEY INFRASTRUCTURE (PKI)
Published 2004Get full text
Get full text
Final Year Project -
4
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
5
-
6
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…The performance proposed encryption algorithm was promising which could be a starting point for detailed analysis and implementation in real application domains.…”
Get full text
Get full text
Get full text
Article -
7
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
Published 2013Get full text
Get full text
Conference or Workshop Item -
8
Digital Certificate-based Authentication Model For Enhanced Smartphone Security
Published 2025journal::journal article -
9
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
10
A new vertical edge detection algorithm and its application
Published 2008Get full text
Get full text
Conference or Workshop Item -
11
Development of optimization Alghorithm for uncertain non-linear dynamical system
Published 2004Get full text
Get full text
Monograph -
12
New Fast Block Matching Algorithm Using New Hybrid Search Pattern And Strategy To Improve Motion Estimation Process In Video Coding Technique
Published 2016“…Up until today, video compression algorithm has been applied in various video applications ranging from video conferencing to video telephony. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Ant colony optimization algorithm for dynamic scheduling of jobs in computational grid
Published 2012“…Job scheduling problem is classified as an NP-hard problem.Such a problem can be solved only by using approximate algorithms such as heuristic and meta-heuristic algorithms.Among different optimization algorithms for job scheduling, ant colony system algorithm is a popular meta-heuristic algorithm which has the ability to solve different types of NP-hard problems.However, ant colony system algorithm has a deficiency in its heuristic function which affects the algorithm behavior in terms of finding the shortest connection between edges.This research focuses on a new heuristic function where information about recent ants’ discoveries has been considered.The new heuristic function has been integrated into the classical ant colony system algorithm.Furthermore, the enhanced algorithm has been implemented to solve the travelling salesman problem as well as in scheduling of jobs in computational grid.A simulator with dynamic environment feature to mimic real life application has been development to validate the proposed enhanced ant colony system algorithm. …”
Get full text
Get full text
Monograph -
15
-
16
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
17
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
18
A Review on the Recent Application of Jaya Optimization Algorithm
Published 2019“…The important difference between Jaya and other optimization algorithms is that Jaya does not require the tuning of its parameters (a process needed in the other algorithms to escape unwanted convergence). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…This paper proposes an efficient approach to improve Rivest Shamir Adleman (RSA) algorithm using parallel technique. RSA public-key cryptosystem has been the most popular and interesting security technique for majority of applications such as internet protocols, secure internet acces and electronic commerce. …”
Get full text
Get full text
Get full text
Article -
20
