Search Results - (( mining reduction methods algorithm ) OR ( _ information rsa algorithm ))
Search alternatives:
- reduction methods »
- methods algorithm »
- information rsa »
- rsa algorithm »
-
1
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
Get full text
Get full text
Thesis -
2
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
3
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…RSA cryptosystem is an information security algorithm used for encrypting and decrypting of digital data in order to protect the content of the data and to ensure its privacy. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
-
5
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
6
RSA algorithm performance in short messaging system exchange environment
Published 2011“…Short Message Service (SMS) is a widely service for brief communication.With the rise of mobile usage it has become a popular tool for transmitting sensitive information. This sensitive information should be totally secure and reliable to exchange.This urgent need for secure SMS, led to drive for RSA implementation, which is considered one of the strongest algorithms in security since we are going to bring big security into small device.Our main goal in this project is to design an experimental test bed application in order to use this application in evaluating the performance of RSA. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Modified multi prime RSA cryptosystem
Published 2018“…Thus, a new algorithm called Multi prime RSA, an extended version of the standard RSA is studied. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005Get full text
Get full text
Final Year Project -
9
RSA Encryption & Decryption using JAVA
Published 2006Get full text
Get full text
Final Year Project -
10
Comparison of ECC and RSA algorithms in IOT devices
Published 2019Get full text
Get full text
Article -
11
Performance of image watermarking algorithm using RSA with Fibonacci transform against attacks
Published 2023“…One such technique to protect digital information is digital image watermarking. This article introduces a watermarking algorithm using Discrete Wavelet Transform and Modified RSA Cryptosystem to secure the digital image. …”
Get full text
Get full text
Article -
12
New directions in factoring the prime power RSA modulus N = prq
Published 2016Get full text
Get full text
Conference or Workshop Item -
13
A comparative S-index in factoring RSA modulus via Lucas sequences
Published 2016Get full text
Get full text
Conference or Workshop Item -
14
Implementation of RSA algorithm
Published 2011Get full text
Get full text
Get full text
Book Chapter -
15
A comparative review on symmetric and asymmetric dna-based cryptography
Published 2023“…Asymmetric cryptography was considered in the second case by incorporating the DNA codes in RSA algorithm. The efficiencies of DNA coding in OTP, RSA, and other algorithms were given. …”
Article -
16
New vulnerabilities of RSA modulus type N = p²q
Published 2016Get full text
Get full text
Conference or Workshop Item -
17
Document classification based on kNN algorithm by term vector space reduction
Published 2023Conference Paper -
18
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
19
Secured electrocardiograph (ECG) signal using partially homomorphic encryption technique–RSA algorithm
Published 2020“…Then, partially homomorphic encryption (PHE) technique - Rivest-Shamir-Adleman (RSA) algorithm was used to encrypt the ECG signal by using the public key. …”
Get full text
Get full text
Get full text
Article -
20
Modified multi-prime RSA using discriminant of a quadratic and Chinese remainder theorem / Nur Fatimah Kabulanto and Farah Aina Abdul Razak
Published 2018“…RSA is one public key Cryptosystem to secure information and communication from third parties and it can be factor by user authentication. …”
Get full text
Get full text
Student Project
