Search Results - (( mobile applications ((usage algorithm) OR (rsa algorithm)) ) OR ( _ application new algorithm ))
Search alternatives:
- mobile applications »
- application new »
- rsa algorithm »
- new algorithm »
-
1
RSA algorithm performance in short messaging system exchange environment
Published 2011“…This sensitive information should be totally secure and reliable to exchange.This urgent need for secure SMS, led to drive for RSA implementation, which is considered one of the strongest algorithms in security since we are going to bring big security into small device.Our main goal in this project is to design an experimental test bed application in order to use this application in evaluating the performance of RSA. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
3
-
4
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Therefore, this paper presents a new mobile botnet classification based on permission and Application Programming Interface (API) calls in the smartphone. …”
Proceedings Paper -
5
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
6
WCDMA teletraffic performance improvement via power resource optimization using distributed parallel genetic algorithm
Published 2023Conference paper -
7
Dynamic characterized genetic algorithm for adaptive beam forming in WCDMA system
Published 2005Get full text
Get full text
Get full text
Proceeding Paper -
8
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
Get full text
Get full text
Thesis -
9
A new mobile malware classification for call log exploitation
Published 2024journal::journal article -
10
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005Get full text
Get full text
Final Year Project -
11
Video content adaptation based on user preferences and network bandwidth / Badariyah Bakhtiar
Published 2007“…System architecture was designed and implement in video adaptation algorithms development. Through the algorithm, rule-based technique was used. …”
Get full text
Get full text
Thesis -
12
-
13
Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway
Published 2023“…Unmanned Aerial Vehicles (UAVs) have a lot of potential for developing new applications in a variety of fields, such as traffic monitoring, security, and military applications. …”
Get full text
Get full text
Get full text
Article -
14
Resource Allocation and Mobility Prediction Algorithms for Multimedia Wireless Cellular Networks
Published 2008“…Among the issues the telecommunication industry is the demand for multimedia applications with Quality of Service (QoS) in wireless/mobile networks. …”
Get full text
Get full text
Thesis -
15
-
16
Intersection Features For Android Botnet Classification
Published 2019“…The evolution of the Internet of things (IoT) has made a significant impact and availed opportunities for mobile device usage on human life. Many of IoT devices will be supposedly controlled through a mobile, giving application (apps) developers great opportunities in the development of new applications. …”
Get full text
Get full text
Get full text
Article -
17
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…Many previous researches focused on elliptic curve and its applications in mobile communication. The purpose of the qualitative study is to explore and develop basic understanding of the properties of the families of Edwards curves, one of the special forms of elliptic curves, and their applications in cryptography, using grounded theory approach, in which the data are hand-analyzed, coded and grouped into themes under study. …”
Get full text
Get full text
Research Reports -
18
How do mobile games connect us? a perspective on social media affordances
Published 2025“…It uncovers the intrinsic logic and value of mobile games as emerging social media platforms and extends the application of affordance theory to the domain of game-based social interactions. …”
Get full text
Get full text
Get full text
Article -
19
-
20
Scale-invariant and adaptive-search template matching for monocular visual odometry in low-textured environment
Published 2016“…Hence, the developed techniques and algorithms have high potential to be implemented in various commercial mobile robotic applications, which utilize VO for improved accuracy, efficiency, and cost effectiveness.…”
Get full text
Get full text
Thesis
