Search Results - (( some application ((use algorithm) OR (rsa algorithm)) ) OR ( _ application testing algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- some application »
- use algorithm »
- rsa algorithm »
-
1
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
-
3
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security.…”
Get full text
Get full text
Proceeding Paper -
4
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Thesis -
5
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
6
Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa...
Published 2019“…Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). …”
Get full text
Get full text
Student Project -
7
A true random number generator for crypto embedded systems
Published 2006“…Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES. …”
Get full text
Get full text
Article -
8
Diabetes prediction system using clonal selection algorithm / Nor Aishah Mustapa
Published 2012“…Diabetes Prediction system using clonal selection algorithm is available to test whether patients suffering from diabetes or not. …”
Get full text
Get full text
Thesis -
9
Test Data Generation for Event Driven System Using Bees Algorithm
Published 2013Get full text
Get full text
Conference or Workshop Item -
10
-
11
-
12
School teacher-subject allocation management system
Published 2024“…The STSAMS in this project is evaluated by using user acceptance test and unit test. The UAT results showed that STSAMS reached 75% user satisfaction level when the users are using the application.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Security analysis of blowfish algorithm
Published 2013Get full text
Get full text
Conference or Workshop Item -
14
Security analysis of blowfish algorithm
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Security issues of Novel RSA variant
Published 2022“…The RSA is one of the current default cryptosystems that provides security with applications such as encryptions and digital signatures. …”
Get full text
Get full text
Article -
16
ANALYSIS AND INTERPRETATION OF PRESSURE TRANSIENT TEST DATA BY RECENT ROBUST DECONVOLUTION METHODS
Published 2013Get full text
Get full text
Final Year Project -
17
Multilingual Sentiment Analysis From Students Feedback: Optimal Techniques And Resources For Bengali Lingual Data
Published 2024thesis::doctoral thesis -
18
Artificial Bee Colony Algorithm for Pairwise Test Generation
Published 2017“…In a case where PABC is not at its optimal stage or its best performance, the experiments of a test case are effectively competitive. PABC progresses as a means to achieve the effective use of the artificial bee colony algorithm for pairwise testing reduction.…”
Get full text
Get full text
Get full text
Article -
19
-
20
Cryptography: A New Approach of Classical Hill Cipher
Published 2013Get full text
Get full text
Article
