Search Results - (( some applications ((rsa algorithm) OR (_ algorithm)) ) OR ( its application bees algorithm ))
Search alternatives:
- some applications »
- application bees »
- its application »
- bees algorithm »
- rsa algorithm »
-
1
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…This paper presents the issues and challenges on some key aspects of cryptanalytic attacks on RSA algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Artificial Bee Colony Algorithm for Pairwise Test Generation
Published 2017“…PABC progresses as a means to achieve the effective use of the artificial bee colony algorithm for pairwise testing reduction.…”
Get full text
Get full text
Get full text
Article -
3
Home buyer assistant using artificial bee colony algorithm / Muhammad Izzat Azri Azman
Published 2017“…This project used Artificial Bee Colony Algorithms (ABC) by adapting the food foraging behaviour of bee in honey bee and find a suitable house for home buyer based on their requirement. …”
Get full text
Get full text
Thesis -
4
-
5
Security issues of Novel RSA variant
Published 2022“…The RSA is one of the current default cryptosystems that provides security with applications such as encryptions and digital signatures. …”
Get full text
Get full text
Article -
6
Data Analysis using Particle Swarm Optimization Algorithm
Published 2015Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security.…”
Get full text
Get full text
Proceeding Paper -
8
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
9
A novel swarm-based optimisation algorithm inspired by artificial neural glial network for autonomous robots
Published 2019“…As an algorithm, PSO can be applied to solve various function optimisation problems, as the main strength of the algorithm is its fast convergence [14]. …”
Get full text
Get full text
Monograph -
10
Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa...
Published 2019“…Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). …”
Get full text
Get full text
Student Project -
11
-
12
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
Published 2006Get full text
Get full text
Thesis -
13
A true random number generator for crypto embedded systems
Published 2006“…Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES. …”
Get full text
Get full text
Article -
14
-
15
-
16
Optimal design of step – cone pulley problem using the bees algorithm
Published 2021Get full text
Get full text
Get full text
Get full text
Book Chapter -
17
Data clustering using the bees algorithm
Published 2007Get full text
Get full text
Conference or Workshop Item -
18
Optimisation of Surface Roughness in 3D Printing Using the Bees Algorithm
Published 2025Get full text
Get full text
Get full text
Get full text
Book Chapter -
19
Protein Conformantional Search Using Bees Algorithm
Published 2008Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Local search manoeuvres recruitment in the bees algorithm
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item
