Search Results - (( its applications ((usage algorithm) OR (rsa algorithm)) ) OR ( its application out algorithm ))
Search alternatives:
- its applications »
- its application »
- application out »
- rsa algorithm »
- out algorithm »
-
1
Partial key attack given MSBs of CRT-RSA private keys
Published 2020“…The CRT-RSA cryptosystem is the most widely adopted RSA variant in digital applications. …”
Get full text
Get full text
Article -
2
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…To date, this research found no known practical implementation of the AAḃ algorithm to prove or to validate its efficiency on a real-world computing platform. …”
Get full text
Get full text
Thesis -
3
-
4
Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases
Published 2008“…Application of data mining to the World Wide Web referred as Web mining is at the cross road of research from several research communities which can be divided into three branches: Web Content Mining, Web Structure Mining and Web Usage Mining. …”
Get full text
Get full text
Get full text
Thesis -
5
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…Genetic algorithm was widely used because of its accuracy and simplicity. …”
Get full text
Get full text
Get full text
Academic Exercise -
7
PID Tuning Of Process Plant Using Evolutionary Algorithm
Published 2014“…However, the advancement of technology has urged the industry to improve overall process in term of its overshoot, rise time, settling and other domains. …”
Get full text
Get full text
Final Year Project -
8
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
9
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
10
Human health status IoT device using data optimization algorithm / Albin Lemuel Kushan ... [et al.]
Published 2021“…The project result shows that the usage of smart devices combine with a data optimization algorithm produces accurate outputs that can later be employed to lessen the work that are carried out by the medical officer.…”
Get full text
Get full text
Book Section -
11
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
12
-
13
-
14
On (unknowingly) using near-square RSA primes
Published 2022“…Since its inception, the RSA cryptosystem has become embedded in millions of digital applications with the objectives of ensuring confidentiality, integrity, authenticity, and disallowing repudiation. …”
Get full text
Get full text
Article -
15
Development of novel tunable dual-band negative index metamaterial using open stub-loaded stepped-impedance resonator
Published 2011“…The results predict its prospect as a very promising alternative to the conventional ones, which is compatibly applicable on various potential microwave devices especially when dual-band function is required. …”
Get full text
Get full text
Get full text
Article -
16
Tunable dual-band metamaterial using open stub-loaded stepped-impedance resonator
Published 2011“…The results predict its prospect as a very promising alternative to the conventional ones, which is compatibly applicable on various potential microwave devices especially when a dual-band function is required. …”
Get full text
Get full text
Conference or Workshop Item -
17
Photogrammetric unmanned aerial vehicle for digital terrain model estimation under oil palm tree canopy area / Suzanah Abdullah
Published 2021“…The accuracy of the DTM was further tested based on in situ experiments and analysed based on RMSE. Following the application of a new methodology on the real site, the result indicated the consistency of DTM values of all the algorithms at different flying heights but there were relatively small differences between all the algorithms used. …”
Get full text
Get full text
Thesis -
18
Bayesian Framework based Brain Source Localization Using High SNR EEG Data
Published 2019“…The multipurpose application of brain source localization in the domain of biomedical engineering has aggrandized the ways for its further development for various healthcare applications. …”
Get full text
Get full text
Conference or Workshop Item -
19
-
20
