Search Results - (( mobile application rsa algorithm ) OR ( its applications using algorithm ))*
Search alternatives:
- applications using »
- its applications »
- application rsa »
- using algorithm »
- rsa algorithm »
-
1
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
2
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…Many previous researches focused on elliptic curve and its applications in mobile communication. The purpose of the qualitative study is to explore and develop basic understanding of the properties of the families of Edwards curves, one of the special forms of elliptic curves, and their applications in cryptography, using grounded theory approach, in which the data are hand-analyzed, coded and grouped into themes under study. …”
Get full text
Get full text
Research Reports -
3
RSA algorithm performance in short messaging system exchange environment
Published 2011“…This sensitive information should be totally secure and reliable to exchange.This urgent need for secure SMS, led to drive for RSA implementation, which is considered one of the strongest algorithms in security since we are going to bring big security into small device.Our main goal in this project is to design an experimental test bed application in order to use this application in evaluating the performance of RSA. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
Get full text
Get full text
Thesis -
5
-
6
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
7
-
8
-
9
Digital Certificate-based Authentication Model For Enhanced Smartphone Security
Published 2025journal::journal article -
10
Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa...
Published 2019“…Due to small keys that had been offered by ECC, instead of RSA, ECC had been used widely in practical applications in embedded system such as mobile devices and IC card. finite field. …”
Get full text
Get full text
Student Project -
11
Digital certificate-based authentication model for enhanced smartphone security / A. H. Azni, Sakiinah Altaf Hussain and Najwa Hayaati Mohd Alwi
Published 2025“…These enhancements make it particularly suited for addressing the evolving security challenges of mobile applications, setting a benchmark for future authentication frameworks in smartphone ecosystems.…”
Get full text
Get full text
Get full text
Article -
12
Structural Equation Modeling Algorithm and Its Application in Business Analytics
Published 2017“…Novelty of this article is in modified steps of SEM application in modeling strategies, also in its developed practical comprehensive SEM application flowchart This article is a roadmap for business advisors and those scholars trying to compute SEM for their decision making, complex modeling and data analysis programming, …”
Get full text
Get full text
Get full text
Book Chapter -
13
Fast decryption method for a Rabin primitive-based cryptosystem
Published 2014“…The Chinese Remainder Theorem (CRT) is an algorithm for solving linear congruence system into a unique representation and has been a useful tool in applications of cryptography. …”
Get full text
Get full text
Get full text
Article -
14
Investigating the Application of Artificial Intelligence for Earthquake Prediction in Terengganu
Published 2023text::Thesis -
15
Orthogonal least square algorithm and its application for modelling suspension system
Published 2001“…The derivation of the algorithm is presented and its application to the modelling of a car suspension system is included to demonstrate the effectiveness of the algorithm.…”
Get full text
Get full text
Get full text
Article -
16
Schelkunoff array synthesis methods using adaptive-iterative algorithm
Published 2003“…By the co-emergence of these algorithms, a better performance and wider application are hoped to be achieved since each of these algorithms has its own advantages respectively. …”
Get full text
Get full text
Get full text
Thesis -
17
Bees algorithm for Forest transportation planning optimization in Malaysia
Published 2021“…Algorithm is widely used in various areas due to its ability to solve classes of problems. …”
Get full text
Get full text
Article -
18
A multi-objective Spiral Dynamic algorithm and its application for PD design
Published 2017“…A Non-dominated sorting (NS) approach from Non-dominated Sorting Genetic Algorithm II (NSGAII) is adopted into SDA to develop its multi-objective (MO) type algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Evaluation of dynamic programming among the existing stereo matching algorithms
Published 2015“…On this research is to perform an evaluation on the performance between the dynamic programming with other existing method as comparison. The algorithm used on the dynamic programming is the global optimization which provides better process on stereo images like its accuracy and its computational efficiency compared to other existing stereo matching algorithms. …”
Get full text
Get full text
Get full text
Article -
20
Autonomous Robot Navigation in Unknown Maze Environment
Published 2012Get full text
Get full text
Final Year Project
