Search Results - (( mobile application ((usage algorithm) OR (rsa algorithm)) ) OR ( _ application kano algorithm ))
Search alternatives:
- application kano »
- kano algorithm »
- rsa algorithm »
-
1
RSA algorithm performance in short messaging system exchange environment
Published 2011“…This sensitive information should be totally secure and reliable to exchange.This urgent need for secure SMS, led to drive for RSA implementation, which is considered one of the strongest algorithms in security since we are going to bring big security into small device.Our main goal in this project is to design an experimental test bed application in order to use this application in evaluating the performance of RSA. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
Get full text
Get full text
Thesis -
3
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005Get full text
Get full text
Final Year Project -
4
-
5
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
6
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…Many previous researches focused on elliptic curve and its applications in mobile communication. The purpose of the qualitative study is to explore and develop basic understanding of the properties of the families of Edwards curves, one of the special forms of elliptic curves, and their applications in cryptography, using grounded theory approach, in which the data are hand-analyzed, coded and grouped into themes under study. …”
Get full text
Get full text
Research Reports -
7
-
8
-
9
Digital Certificate-based Authentication Model For Enhanced Smartphone Security
Published 2025journal::journal article -
10
Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa...
Published 2019“…Due to small keys that had been offered by ECC, instead of RSA, ECC had been used widely in practical applications in embedded system such as mobile devices and IC card. finite field. …”
Get full text
Get full text
Student Project -
11
Context Aware Handover Algorithms For Mobile Positioning Systems
Published 2014“…Battery usage of the proposed solution is less than one third of the battery usage of two other applications. …”
Get full text
Get full text
Get full text
Article -
12
Embedded parallel distributed artificial intelligent processors for adaptive beam forming in WCDMA system
Published 2023“…Adaptive antenna has dynamic beam to cater for users' needs and provides better capacity for mobile communication but requires more intelligent and advance beam forming algorithm such as genetic algorithm. …”
Conference paper -
13
IMPLEMENTATION OF GRAPH BASED PATH PLANNING ALGORITHMS FOR INDOOR NAVIGATION
Published 2018“…Thus, the A* algorithm is implemented in a small mobile robot, this is to see its effectiveness in real world application. …”
Get full text
Get full text
Final Year Project -
14
-
15
WCDMA teletraffic performance improvement via power resource optimization using distributed parallel genetic algorithm
Published 2023Conference paper -
16
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Mostly, it attacks Android due to its popularity and high usage among end users. Every day, more and more malicious mobile applications (apps) with the botnet capability have been developed to exploit end users' smartphones. …”
Proceedings Paper -
17
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
18
Novel scheduling algorithm for optimizing real-time multimedia performance in Long-Term Evolution Advanced
Published 2017“…Real-time multimedia applications are becoming increasingly popular among mobile cellular users. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
Dynamic characterized genetic algorithm for adaptive beam forming in WCDMA system
Published 2005Get full text
Get full text
Get full text
Proceeding Paper -
20
Video content adaptation based on user preferences and network bandwidth / Badariyah Bakhtiar
Published 2007“…Offering mobile services to nomadic users involved the limited display and networking capacity of the mobile devices. …”
Get full text
Get full text
Thesis
