Search Results - (( some applications ((rsa algorithm) OR (_ algorithm)) ) OR ( its application means algorithm ))

Refine Results
  1. 1

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Security issues of Novel RSA variant by Nitaj, Abderrahmane, Kamel Ariffin, Muhammad Rezal, Adenan, Nurul Nur Hanisah, Lau, Terry Shue Chien, Che, Jiahui

    Published 2022
    “…The RSA is one of the current default cryptosystems that provides security with applications such as encryptions and digital signatures. …”
    Get full text
    Get full text
    Article
  4. 4

    Comparison between RSA hardware and software implementation for WSNs sexcurity schemes by Md. Tap, Abu Osman, Manttoro, Teddy, Alkalbani, Abdullah Said

    Published 2010
    “…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security.…”
    Get full text
    Get full text
    Proceeding Paper
  5. 5
  6. 6

    Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa... by Noor Hamid, Ahmad Asif Bakhtiar Noor, Nor Zailan, Nor Syazwani, Ishak, Syaza Farlisa

    Published 2019
    “…Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). …”
    Get full text
    Get full text
    Student Project
  7. 7

    The fusion of particle swarm optimization (PSO) and interior point method (IPM) as cooperative movement control algorithm in Swarm Robotics / Dada Emmanuel Gbenga by Dada Emmanuel, Gbenga

    Published 2016
    “…It is demonstrated in the literature that methods that hybridize PSO and some other optimisation algorithm have a better performance over the standard PSO algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    A modified generalized RBF model with EM-based learning algorithm for medical applications by Ma, Li Ya, Abdul Rahman, Abdul Wahab, Quek, Chai

    Published 2006
    “…Moreover, GRBF trained by the new algorithm has an apparent statistical meaning. Experimental results show potentials for real-life applications.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10
  11. 11
  12. 12

    Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF) by Mazlan, Nurul Hidayah

    Published 2019
    “…The proposed algorithm considered features based on its level of importance where weight given based on number of features involved in the sample. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    How to Test the Means among Heteroscedastic Normal Populations by Abd. Rahman, Mohd Nawi

    Published 1988
    “…To facilitate the application of the procedure, an efficient estimation algorithm is shown for its means and the corresponding variance-covariance matrix. …”
    Get full text
    Get full text
    Article
  14. 14

    Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja by Nurul Hani , Nortaja

    Published 2004
    “…This thesis also provides an explanation about the advantages. functions, characteristics. the degree of complexity in A • algorithm and its implementation in real-world application. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A true random number generator for crypto embedded systems by M.Thamrin, Norashikin, Ahmad, Illiasaak, Hani, Mohamed Khalil

    Published 2006
    “…Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES. …”
    Get full text
    Get full text
    Article
  16. 16

    Artificial Bee Colony Algorithm for Pairwise Test Generation by Alazzawi, Ammar K., Homaid, Ameen A. Ba, Alomoush, Alaa A., Alsewari, Abdulrahman A.

    Published 2017
    “…PABC progresses as a means to achieve the effective use of the artificial bee colony algorithm for pairwise testing reduction.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    A novel swarm-based optimisation algorithm inspired by artificial neural glial network for autonomous robots by Ismail, Amelia Ritahani, Tumian, Afidalina

    Published 2019
    “…Several areas of engineering have adopted the idea that swarms can solve complex problems and some of them are described in [13]. Some of the examples highlighted by [13] are a combinatorial optimisation, routing communications network, as well as solving robotics applications. …”
    Get full text
    Get full text
    Monograph
  19. 19
  20. 20