Search Results - (( its application towards algorithm ) OR ( code application rsa algorithm ))*
Search alternatives:
- towards algorithm »
- code application »
- its application »
- application rsa »
- rsa algorithm »
-
1
-
2
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The study recommends to use another type of digital signature algorithm to be used in the proposed method. Another recommendation is to modify and optimise the python coding in the study to be more robust and suitable for real world application.…”
Get full text
Get full text
Student Project -
3
Implementation of RSA algorithm
Published 2011Get full text
Get full text
Get full text
Book Chapter -
4
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…Embedded C language codes are then written to test the functionality of the RSA co-processor on hardware. …”
Get full text
Get full text
Thesis -
5
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…Many previous researches focused on elliptic curve and its applications in mobile communication. The purpose of the qualitative study is to explore and develop basic understanding of the properties of the families of Edwards curves, one of the special forms of elliptic curves, and their applications in cryptography, using grounded theory approach, in which the data are hand-analyzed, coded and grouped into themes under study. …”
Get full text
Get full text
Research Reports -
6
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Thesis -
7
Simulation of quantum growing network / Ong Boon Teong
Published 2003Get full text
Get full text
Thesis -
8
-
9
-
10
Spiral sine-cosine algorithm for global optimization
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Genetic algorithm optimized receiver-oriented packet clustering in multi-buffer network card
Published 2016“…The expansion adds a new gene to our chromosome, which is number of buffers, and its effect towards convergence of fitness values is also a part of our objectives. …”
Get full text
Get full text
Article -
12
Hybrid genetic manta ray foraging optimization and its application to interval type 2 fuzzy logic control of an inverted pendulum system
Published 2020“…However, this optimization algorithm can be improved in its strategy which increases its accuracy. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
VHDL modeling and simulation of the back-propagation algorithm and its mapping to the RM
Published 1993Get full text
Get full text
Get full text
Proceeding Paper -
14
An algorithm for navigation of mobile robots in cluttered environments
Published 2013Get full text
Get full text
Article -
15
Optimal PID controller for the DC-DC buck converter using the improved sine cosine algorithm
Published 2024“…Generated findings subsequently uncovered overshadowing efficacy of the proposed method over its algorithmic predecessors towards exceptionally enhanced transitory response of the DC-DC buck converter.…”
Get full text
Get full text
Get full text
Article -
16
Restaurant locator using Djikstra Algorithm / Mohamad Aliff Hakimi Lukman Hakim
Published 2017“…This route-finding problem is one of the most important computer applications in the transportation industry. In network theory, it’s known as the shortest-path problem, and Dijkstra’s algorithm is usually used to solve it. …”
Get full text
Get full text
Thesis -
17
Towards robust skin colour detection and tracking
Published 2009Get full text
Get full text
Get full text
Proceeding Paper -
18
Towards a Privacy Diagnosis Centre : Measuring k-anonymity
Published 2008Get full text
Get full text
Conference or Workshop Item -
19
-
20
