Search Results - (( its applications security algorithm ) OR ( wave application using algorithm ))*
Search alternatives:
- its applications »
- wave application »
- using algorithm »
-
1
Secured mobile transaction using NFC Technology: Top-Up printing system
Published 2011“…NFC technology has become a success across a broad range of applications depending on its large- scale adoption by enterprises and consumers. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
NFC secured online transaction in mobile computing business
Published 2012“…As proof of concept, a Top-up printing system is developed and for interaction with contactless interface, an ACR 100 Reader with ACOS3 SIM card is used. As for the security measurement, MD5 algorithm is implemented to process the system authorization. …”
Get full text
Get full text
Get full text
Article -
3
Implementation of a Symmetric Chaotic Encryption Scheme
Published 2004Get full text
Get full text
Final Year Project -
4
-
5
-
6
Design and implementation of cordic algorithm with sinusoidal pulse width modulation switching strategy
Published 2017“…Usually, one sinusoidal wave is used for one inverter. In this design, SPWM is used for multilevel inverter application in photovoltaic (PV) system. …”
Get full text
Get full text
Student Project -
7
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT
Published 2024journal::journal article -
9
-
10
A study of mobile IP and its security aspects in a LAN environment / Suhaila Che Ismail
Published 1998“…Each mobile IP agent needs a different application and independently configured. Therefore, a thorough research is to be accomplished in order to produce the mobile IP to the extent of the security features and the algorithm.…”
Get full text
Get full text
Thesis -
11
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
12
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
13
Modelling of tsunami wave spectra propagation run-up in Sri-Lanka and Indonesia
Published 2006Get full text
Get full text
Conference or Workshop Item -
14
Simulation of Tsunami Wave Spectra on Sri Lanka and Indonesia
Published 2006Get full text
Get full text
Article -
15
Simulation of Tsunami Wave Spectra on Sri-Lanka and Indonesia
Published 2006Get full text
Get full text
Article -
16
-
17
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
Get full text
Get full text
Article -
18
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
Get full text
Get full text
Article -
19
Optical soliton perturbation with quadratic-cubic nonlinearity / Mir Asma
Published 2020“…This study is an addendum to the previously reported results on optical solitons solely, in view of the fact that, its fundamental nature as well as its potential applications to optoelectronic communication. …”
Get full text
Get full text
Get full text
Thesis -
20
