Search Results - (( its application rsa algorithm ) OR ( based application clustering algorithm ))
Search alternatives:
- application clustering »
- based application »
- its application »
- application rsa »
- rsa algorithm »
-
1
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
3
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
4
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
5
-
6
Partial key attack given MSBs of CRT-RSA private keys
Published 2020“…The CRT-RSA cryptosystem is the most widely adopted RSA variant in digital applications. …”
Get full text
Get full text
Article -
7
On (unknowingly) using near-square RSA primes
Published 2022“…Since its inception, the RSA cryptosystem has become embedded in millions of digital applications with the objectives of ensuring confidentiality, integrity, authenticity, and disallowing repudiation. …”
Get full text
Get full text
Article -
8
-
9
A study of density-grid based clustering algorithms on data streams
Published 2011Get full text
Get full text
Conference or Workshop Item -
10
On density-based data streams clustering algorithms: A survey
Published 2017“…Recently, a lot of density-based clustering algorithms are extended for data streams. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Harmony Search-Based Fuzzy Clustering Algorithms For Image Segmentation
Published 2011“…Second, a new dynamic HS-based fuzzy clustering algorithm (DCHS) is proposed to automatically estimate the appropriate number of clusters as well as a good fuzzy partitioning of the given dataset. …”
Get full text
Get full text
Thesis -
12
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
Get full text
Get full text
Thesis -
13
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. …”
Article -
14
Cluster Analysis of Data Points using Partitioning and Probabilistic Model-based Algorithms
Published 2014“…Some clustering algorithms, especially those that are partitioned-based, clusters any data presented to them even if similar features do not present. …”
Get full text
Get full text
Get full text
Article -
15
Knowledge-based genetic algorithm for multidimensional data clustering
Published 2013Get full text
Get full text
Get full text
Proceeding Paper -
16
An adaptive density-based method for clustering evolving data streams / Amineh Amini
Published 2014“…Due to these characteristics the traditional densitybased clustering is not applicable. Recently, a number of density-based algorithms have been developed for clustering data streams. …”
Get full text
Get full text
Get full text
Thesis -
17
-
18
-
19
A novel clustering based genetic algorithm for route optimization
Published 2016“…It was also observed that the introduction of clustering based selection algorithm guaranteed the selection of cluster with the optimal solution in every generation. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
20
