Search Results - (( its application ((rsa algorithm) OR (tree algorithm)) ) OR ( _ application system algorithm ))
Search alternatives:
- system algorithm »
- tree algorithm »
- rsa algorithm »
-
1
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
3
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…Among those cryptosystems, there are three types of public key cryptographic systems that are currently considered both secure and efficient, classified according to the mathematical problems upon which they are based: the Integer Factorization Systems (of which the RSA algorithm is the most well known example), the Discrete logarithm Systems (such as the US Government’s Digital Signature Algorithm) and the Elliptic Curve Cryptosystem (ECC). …”
Get full text
Get full text
Research Reports -
4
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
Get full text
Get full text
Thesis -
5
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. …”
Article -
6
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
7
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
8
CHAOS AND PUBLIC KEY INFRASTRUCTURE (PKI)
Published 2004Get full text
Get full text
Final Year Project -
9
Selection, generation and extraction of MCCTree using XMCCTree
Published 2012Get full text
Get full text
Get full text
Article -
10
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
Published 2013Get full text
Get full text
Conference or Workshop Item -
11
-
12
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
13
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…The performance proposed encryption algorithm was promising which could be a starting point for detailed analysis and implementation in real application domains.…”
Get full text
Get full text
Get full text
Article -
14
Data Classification and Its Application in Credit Card Approval
Published 2004“…The result of this application using the sample credit card approval dataset includes a decision tree, a set of rules derived from the decision tree and its accuracy. …”
Get full text
Get full text
Final Year Project -
15
Tree physiology optimization on SISO and MIMO PID control tuning
Published 2018“…A simulation of SISO control system and an industrial application of MIMO control are applied to demonstrate the effectiveness of the proposed algorithm and compared with other optimization methods such as particle swarm optimization, Zieglerâ��Nichols, Tyreusâ��Luyben and Chienâ��Hronesâ��Reswick methods. …”
Get full text
Get full text
Article -
16
Tree physiology optimization on SISO and MIMO PID control tuning
Published 2018“…A simulation of SISO control system and an industrial application of MIMO control are applied to demonstrate the effectiveness of the proposed algorithm and compared with other optimization methods such as particle swarm optimization, Zieglerâ��Nichols, Tyreusâ��Luyben and Chienâ��Hronesâ��Reswick methods. …”
Get full text
Get full text
Article -
17
Comparison of machine learning algorithms for estimating mangrove age using sentinel 2A at Pulau Tuba, Kedah, Malaysia / Fareena Faris Francis Singaram
Published 2021“…The supervised machine learning algorithm, SVM and Decision Tree are used for the estimation of the mangrove age into young and mature. …”
Get full text
Get full text
Thesis -
18
An FPGA based embedded vision system for real-time motion detection
Published 2015Get full text
Get full text
Get full text
Proceeding Paper -
19
-
20
Developing a secure mechanism for Bluetooth-based Wireless Personal Area Networks (WPANs)
Published 2007“…Our work involves developing a prototype for Bluetooth systems using RSA and DSA encryption algorithms. An analysis was done to ascertain which of these algorithms is more suited to our proposed security framework and the results indicated that in most instances, the RS A performed better.…”
Get full text
Get full text
Get full text
Proceeding Paper
