Search Results - (( some applications ((rsa algorithm) OR (tree algorithm)) ) OR ( _ application out algorithm ))
Search alternatives:
- some applications »
- application out »
- tree algorithm »
- rsa algorithm »
- out algorithm »
-
1
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…This paper presents the issues and challenges on some key aspects of cryptanalytic attacks on RSA algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
-
3
-
4
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The algorithm exploits all interests and preferences in a hierarchy tree structure. …”
Get full text
Get full text
Thesis -
5
Security issues of Novel RSA variant
Published 2022“…The RSA is one of the current default cryptosystems that provides security with applications such as encryptions and digital signatures. …”
Get full text
Get full text
Article -
6
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security.…”
Get full text
Get full text
Proceeding Paper -
7
-
8
-
9
Simulation of quantum growing network / Ong Boon Teong
Published 2003Get full text
Get full text
Thesis -
10
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
Published 2006Get full text
Get full text
Thesis -
11
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
12
Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa...
Published 2019“…Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). …”
Get full text
Get full text
Student Project -
13
-
14
Optimizing tree planting areas through integer programming and improved genetic algorithm
Published 2012“…The algorithmic solution with some strategies mainly focuses on efficiency. …”
Get full text
Get full text
Thesis -
15
-
16
Tree physiology optimization in constrained optimization problem
Published 2018“…Besides of good quality of performance, some metaheuristic algorithms have limitations that may deteriorate by certain degree of difficulties especially in real-world application. …”
Get full text
Get full text
Article -
17
Developing emergency application for LRT passengers with decision tree algorithm (RailAlert!) / Ezrren Natasha Baddru’l-Sham … [et al.]
Published 2023“…With geolocation and decision tree algorithms, this project aims to design and develop an emergency application for LRT passengers. …”
Get full text
Get full text
Book Section -
18
Developing emergency application for LRT passengers with decision tree algorithm (RailAlert!) / Ezrren Natasha Baddru’l-Sham … [et al.]
Published 2023“…With geolocation and decision tree algorithms, this project aims to design and develop an emergency application for LRT passengers. …”
Get full text
Get full text
Book Section -
19
Spanning Tree Transformation of Connected Graph into Single-Row Network
Published 2010Get full text
Get full text
Conference or Workshop Item -
20
A true random number generator for crypto embedded systems
Published 2006“…Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES. …”
Get full text
Get full text
Article
