Search Results - (( its application ((rsa algorithm) OR (new algorithm)) ) OR ( mobile applications _ algorithm ))
Search alternatives:
- mobile applications »
- its application »
- rsa algorithm »
- new algorithm »
-
1
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
2
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…Cryptography is the science of hiding information and its applications include ATM cards, computer passwords and electronic commerce in this modern world. …”
Get full text
Get full text
Research Reports -
3
A new efficient checkpointing algorithm for distributed mobile computing
Published 2015“…This algorithm is characterized by its efficiency and optimization in terms of incurred time-space overhead during checkpointing process and normal application running period.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
4
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
5
CHAOS AND PUBLIC KEY INFRASTRUCTURE (PKI)
Published 2004Get full text
Get full text
Final Year Project -
6
A study of mobile IP and its security aspects in a LAN environment / Suhaila Che Ismail
Published 1998“…This is a new solution meant for a mobile node that might be utilising applications that may not be interrupted when the mobile node moves from one link to another. …”
Get full text
Get full text
Thesis -
7
A new mobile botnet classification based on permission and API calls
Published 2024Subjects:Conference Paper -
8
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Therefore, this paper presents a new mobile botnet classification based on permission and Application Programming Interface (API) calls in the smartphone. …”
Proceedings Paper -
9
Performance evaluation of PID controller optimisation for wheel mobile robot using Bat based optimisation algorithm
Published 2022“…Applications of mobile robots cover both industrial and domestic area. …”
Get full text
Get full text
Book Chapter -
10
Fast handover algorithm for hierarchical mobile IPv6 macro-mobility management
Published 2003Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
-
12
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
13
Digital Certificate-based Authentication Model For Enhanced Smartphone Security
Published 2025journal::journal article -
14
Adaptive fault tolerant checkpointing algorithm for cluster based mobile Ad Hoc networks
Published 2015“…This has made possible to create a distributed mobile computing application and has also brought several new challenges in distributed algorithm design. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
16
-
17
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Mobile game application development using evolutionary algorithms
Published 2014“…Evolutionary Algorithms have never been used on mobile applications, thus it gives a novel idea of utilizing Evolutionary Algorithms in developing applications typically in games for mobile platforms. …”
Get full text
Get full text
Get full text
Thesis -
19
-
20
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
Published 2013Get full text
Get full text
Conference or Workshop Item
