Search Results - (( its application tree algorithm ) OR ( mobile application ((use algorithm) OR (rsa algorithm)) ))
Search alternatives:
- application tree »
- its application »
- tree algorithm »
- use algorithm »
- rsa algorithm »
-
1
RSA algorithm performance in short messaging system exchange environment
Published 2011“…This sensitive information should be totally secure and reliable to exchange.This urgent need for secure SMS, led to drive for RSA implementation, which is considered one of the strongest algorithms in security since we are going to bring big security into small device.Our main goal in this project is to design an experimental test bed application in order to use this application in evaluating the performance of RSA. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005Get full text
Get full text
Final Year Project -
3
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…Embedded C language codes are then written to test the functionality of the RSA co-processor on hardware. Upon verification, a demonstration application prototype that performs RSA encryption and decryption is developed using Visual Basic 6.0. …”
Get full text
Get full text
Thesis -
4
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
5
-
6
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
7
-
8
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
9
-
10
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…Many previous researches focused on elliptic curve and its applications in mobile communication. The purpose of the qualitative study is to explore and develop basic understanding of the properties of the families of Edwards curves, one of the special forms of elliptic curves, and their applications in cryptography, using grounded theory approach, in which the data are hand-analyzed, coded and grouped into themes under study. …”
Get full text
Get full text
Research Reports -
11
Sentiment Analysis on Users' Satisfaction for Mobile Banking Apps in Malaysia
Published 2022“…A service offered by a bank or other financial institution that enables its users to execute financial transactions remotely using a mobile device, such as a smartphone or tablet, is known as mobile banking. …”
Get full text
Get full text
Get full text
Article -
12
-
13
Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa...
Published 2019“…Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). …”
Get full text
Get full text
Student Project -
14
Comparison of path planning in simulated robot
Published 2020“…This is because each path planning algorithm has its own applicable domain, performance, advantages and disadvantages in various situations. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Development of a Reliable Multicast Protocol in Mobile Ad Hoc Networks
Published 2008Get full text
Get full text
Thesis -
16
DurianCare: optimising trunk disease detection and precision farming in a mobile application / Muhammad Haziq Azmi
Published 2025“…The project will implement automated detection and disease management recommendation algorithms while evaluating the functionality and usability of the designed application. …”
Get full text
Get full text
Thesis -
17
Design of Predictive Model for TCM Tongue Diagnosis In Malaysia Using Machine Learning
Published 2020Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
-
19
Digital Certificate-based Authentication Model For Enhanced Smartphone Security
Published 2025journal::journal article -
20
A Scalable Algorithm for Constructing Frequent Pattern Tree
Published 2014Get full text
Get full text
Get full text
Article
