Search Results - (( mobile application ((usage algorithm) OR (rsa algorithm)) ) OR ( _ applications a algorithm ))
Search alternatives:
- _ applications »
- applications a »
- rsa algorithm »
- a algorithm »
-
1
RSA algorithm performance in short messaging system exchange environment
Published 2011“…Short Message Service (SMS) is a widely service for brief communication.With the rise of mobile usage it has become a popular tool for transmitting sensitive information. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…Lastly the project has the objective to deploy and a grid computing facility that will beuse as a test bed for RSA algorithm Methodology used for the development is Rapid Application Development (RAD) as it will allow for fast development with a series of testing and prototyping. …”
Get full text
Get full text
Final Year Project -
3
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
Get full text
Get full text
Thesis -
4
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
5
-
6
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…Many previous researches focused on elliptic curve and its applications in mobile communication. The purpose of the qualitative study is to explore and develop basic understanding of the properties of the families of Edwards curves, one of the special forms of elliptic curves, and their applications in cryptography, using grounded theory approach, in which the data are hand-analyzed, coded and grouped into themes under study. …”
Get full text
Get full text
Research Reports -
7
-
8
-
9
IMPLEMENTATION OF GRAPH BASED PATH PLANNING ALGORITHMS FOR INDOOR NAVIGATION
Published 2018“…Thus, the A* algorithm is implemented in a small mobile robot, this is to see its effectiveness in real world application. …”
Get full text
Get full text
Final Year Project -
10
Embedded parallel distributed artificial intelligent processors for adaptive beam forming in WCDMA system
Published 2023“…Adaptive antenna has dynamic beam to cater for users' needs and provides better capacity for mobile communication but requires more intelligent and advance beam forming algorithm such as genetic algorithm. …”
Conference paper -
11
Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa...
Published 2019“…Due to small keys that had been offered by ECC, instead of RSA, ECC had been used widely in practical applications in embedded system such as mobile devices and IC card. finite field. …”
Get full text
Get full text
Student Project -
12
WCDMA teletraffic performance improvement via power resource optimization using distributed parallel genetic algorithm
Published 2023Conference paper -
13
Novel scheduling algorithm for optimizing real-time multimedia performance in Long-Term Evolution Advanced
Published 2017“…This paper proposes a packet scheduling algorithm known as Novel Scheduling for usage in the downlink LTE-A. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
14
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Therefore, this paper presents a new mobile botnet classification based on permission and Application Programming Interface (API) calls in the smartphone. …”
Proceedings Paper -
15
-
16
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
17
Digital Certificate-based Authentication Model For Enhanced Smartphone Security
Published 2025journal::journal article -
18
Dynamic characterized genetic algorithm for adaptive beam forming in WCDMA system
Published 2005Get full text
Get full text
Get full text
Proceeding Paper -
19
Video content adaptation based on user preferences and network bandwidth / Badariyah Bakhtiar
Published 2007“…The diversity of multimedia presentation environment sets strict requirements for multimedia applications and systems. Since the invention of the computer, content has been tailored towards a specific device, mainly by hand. …”
Get full text
Get full text
Thesis -
20
