Search Results - (( its application ((rsa algorithm) OR (tree algorithm)) ) OR ( its application system algorithm ))

Refine Results
  1. 1

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Privacy in medical emergency system: cryptographic and security aspects by Hameed, Shihab A., Yuchoch, Habib, Al-Khateeb, Wajdi Fawzi Mohammed

    Published 2010
    “…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim by Kamaruddin, Nurul Azwa, Mustakim, Nurul Ain

    Published 2012
    “…Cryptography is the science of hiding information and its applications include ATM cards, computer passwords and electronic commerce in this modern world. …”
    Get full text
    Get full text
    Research Reports
  4. 4

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…To date, this research found no known practical implementation of the AAḃ algorithm to prove or to validate its efficiency on a real-world computing platform. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen by Shawkat S.A., Tuama B.A., Al-Barazanchi I.

    Published 2023
    “…The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. …”
    Article
  6. 6

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    Data Classification and Its Application in Credit Card Approval by Thai , VinhTuan

    Published 2004
    “…The result of this application using the sample credit card approval dataset includes a decision tree, a set of rules derived from the decision tree and its accuracy. …”
    Get full text
    Get full text
    Final Year Project
  11. 11
  12. 12
  13. 13
  14. 14

    Comparison of machine learning algorithms for estimating mangrove age using sentinel 2A at Pulau Tuba, Kedah, Malaysia / Fareena Faris Francis Singaram by Faris Francis Singaram, Fareena

    Published 2021
    “…The supervised machine learning algorithm, SVM and Decision Tree are used for the estimation of the mangrove age into young and mature. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection by Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…The performance proposed encryption algorithm was promising which could be a starting point for detailed analysis and implementation in real application domains.…”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Tree physiology optimization on SISO and MIMO PID control tuning by Halim, A.H., Ismail, I.

    Published 2018
    “…A simulation of SISO control system and an industrial application of MIMO control are applied to demonstrate the effectiveness of the proposed algorithm and compared with other optimization methods such as particle swarm optimization, Zieglerâ��Nichols, Tyreusâ��Luyben and Chienâ��Hronesâ��Reswick methods. …”
    Get full text
    Get full text
    Article
  18. 18

    Tree physiology optimization on SISO and MIMO PID control tuning by Halim, A.H., Ismail, I.

    Published 2018
    “…A simulation of SISO control system and an industrial application of MIMO control are applied to demonstrate the effectiveness of the proposed algorithm and compared with other optimization methods such as particle swarm optimization, Zieglerâ��Nichols, Tyreusâ��Luyben and Chienâ��Hronesâ��Reswick methods. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20