Search Results - (( its application rsa algorithm ) OR ( iot ((application based) OR (location based)) algorithm ))
Search alternatives:
- application based »
- its application »
- application rsa »
- rsa algorithm »
-
1
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
Get full text
Get full text
Thesis -
2
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
An Improved Indoor Positioning Algorithm Based on RSSI-Trilateration Technique for Internet of Things (IOT)
Published 2023Conference Paper -
4
Implementation and analysis of an updating data strategy on iot-waspmote gases testbed with 2.4 ghz xbee for air quality application
“…Battery life is a key factor in the performance of the Internet of Things (IoT) applications. The size and number of transmitted packets are responsible for most of the energy consumption in IoT applications. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Blockchain based security framework for device authentication and data communication in decentralized IoT network
Published 2023“…In light of the aforementioned issues, this thesis presents a lightweight, scalable, and secure authentication framework for IoT networks based on blockchain technology. First, this thesis proposes a clustering algorithm for IoT devices based on the device energy residues, the device location relative to other devices in the network, and the device computational ability. …”
Get full text
Get full text
Thesis -
6
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
7
Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway
Published 2023“…Due to its mobility nature with the addition of effective path planning, the AG is able to hover at each stop point, making it ideal for usage in crowded regions with high demand, emergency circumstances, and distant locations with no access to fixed base stations.…”
Get full text
Get full text
Get full text
Article -
8
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
9
A wireless interference-aware internet-of-things gateway placement framework with genetic algorithm approach
Published 2022“…The solution takes the layout of sensor nodes as input and generates a set of proposed IoT gateway locations. The framework generates the solution using genetic algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
11
Intelligent Multi-cellular Network Connectivity for Internet of Things Applications
Published 2023Conference Paper -
12
ON CAMPUS IOT DEMONSTRATION FOR STUDENT HOTSPOT TRACKING USING WIRELESS SENSORS NETWORK AND INTEGRATED SOFTWARE PLATEFORM
Published 2017“…The RSSI value can be used to derived a distance between the transmitter and receiver of that communication. Based on this approximate distance value from RSSI, this project will implement triangulation algorithm to estimate the location of a receiver based on the 3 estimated that send by the three known receiver.…”
Get full text
Get full text
Final Year Project -
13
Development of IoT-based automated dynamic emergency response system against fire incidents in academic building
Published 2023“…This study aims to address the need for improved firefighting systems in academic building by proposing the development of an IoT-based automated emergency response website. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
-
15
Partial key attack given MSBs of CRT-RSA private keys
Published 2020“…The CRT-RSA cryptosystem is the most widely adopted RSA variant in digital applications. …”
Get full text
Get full text
Article -
16
On (unknowingly) using near-square RSA primes
Published 2022“…Since its inception, the RSA cryptosystem has become embedded in millions of digital applications with the objectives of ensuring confidentiality, integrity, authenticity, and disallowing repudiation. …”
Get full text
Get full text
Article -
17
-
18
Design and Fabrication of Smart Home With Internet of Things Enabled Automation System
Published 2019“…Therefore, this study presents a cost-effective and hybrid (local and remote) IoT-based home automation system with a user-friendly interface for smartphones and laptops. …”
Get full text
Get full text
Get full text
Article -
19
Enhancing indoor positioning service for location based internet of things (IoT): a source selecting approach with error compensation
Published 2017Get full text
Get full text
Conference or Workshop Item -
20
