Search Results - (( mobile application sensor algorithm ) OR ( its application rsa algorithm ))*
Search alternatives:
- application sensor »
- sensor algorithm »
- its application »
- application rsa »
- rsa algorithm »
-
1
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
3
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
4
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
5
-
6
Partial key attack given MSBs of CRT-RSA private keys
Published 2020“…The CRT-RSA cryptosystem is the most widely adopted RSA variant in digital applications. …”
Get full text
Get full text
Article -
7
A centralized localization algorithm for prolonging the lifetime of wireless sensor networks using particle swarm optimization in the existence of obstacles
Published 2017“…Particle Swarm Optimization has been used in the proposed algorithm to minimize the fitness function. Voronoi diagram has also used in order to ensure that the mobile sensors cover the whole sensing field. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
On (unknowingly) using near-square RSA primes
Published 2022“…Since its inception, the RSA cryptosystem has become embedded in millions of digital applications with the objectives of ensuring confidentiality, integrity, authenticity, and disallowing repudiation. …”
Get full text
Get full text
Article -
9
Mobile data gathering algorithms for wireless sensor networks
Published 2014“…This algorithm enables shortened tour length for the respective mobile element. …”
Get full text
Get full text
Thesis -
10
-
11
Wireless sensor nodes deployment using multi-robot based on improved spanning tree algorithm
Published 2015“…By merging wireless sensor nodes with mobile robots, the performance of wireless sensor network applications may be improved. …”
Get full text
Get full text
Thesis -
12
Dynamic area coverage algorithms for static and mobile wireless sensor network environments using voronoi techniques
Published 2011“…The proposed Voronoi Tessellation-based Coverage Optimization Algorithms for Static and Mobile Wireless Sensor Networks provides up to 99% coverage at various number of mobile-static sensor node combination and up to 12% reduction in average moving distance. …”
Get full text
Get full text
Thesis -
13
-
14
Optimized-Hilbert for mobility in wireless sensor networks
Published 2007Get full text
Get full text
Get full text
Book Section -
15
A green clustering protocol for mobile sensor network using particle swarm optimization
Published 2016“…One of the methods that can improve the utilization of sensor nodes batteries is the clustering method. In this paper, we propose a green clustering protocol for mobile sensor networks using particle swarm optimization (PSO) algorithm. …”
Get full text
Get full text
Article -
16
A green clustering protocol for mobile sensor network using particle swarm optimization
Published 2016“…One of the methods that can improve the utilization of sensor nodes batteries is the clustering method. In this paper, we propose a green clustering protocol for mobile sensor networks using particle swarm optimization (PSO) algorithm. …”
Get full text
Get full text
Article -
17
A Modified Hybrid Fuzzy Controller for Real-Time Mobile Robot Navigation
Published 2023Conference Paper -
18
Pose estimation algorithm for mobile Augmented Reality based on inertial sensor fusion
Published 2021“…After incorporating the sensor (gyroscope) data with the vision-based pose estimation, the result shows improved pose estimation performance and augmentation of the 3D object in MAR applications. …”
Get full text
Get full text
Get full text
Article -
19
-
20
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
Get full text
Get full text
Thesis
