Search Results - (( some applications ((usage algorithm) OR (rsa algorithm)) ) OR ( _ application based algorithm ))
Search alternatives:
- some applications »
- application based »
- rsa algorithm »
-
1
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security.…”
Get full text
Get full text
Proceeding Paper -
2
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
3
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…This paper presents the issues and challenges on some key aspects of cryptanalytic attacks on RSA algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
Published 2006Get full text
Get full text
Thesis -
5
A true random number generator for crypto embedded systems
Published 2006“…Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES. …”
Get full text
Get full text
Article -
6
Achieving security by combining Huffman and SLSB algorithms
Published 2013Get full text
Get full text
Get full text
Article -
7
-
8
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…But the major treat of the IPSec is caused by the usage or the algorithm that has weak keys. The algorithms are DES, 3DES, Blowfish, Cast128 and RC5. …”
Get full text
Get full text
Conference or Workshop Item -
9
E-Hadith DV: Hadith scriptures in Syafie Madhhab retrieval using data visualization / Nor Faezahtul Salme Norhisam
Published 2020“…Implementation of sentence-based searching and the usage of the stemming algorithm would be considered to produce more meaningful results for future work.…”
Get full text
Get full text
Thesis -
10
Fruit-Fly Based Searching Algorithm For Cooperative Swarming Robotic System
Published 2013“…Using the existing lawnmower methods incur substantial costs in terms of time, accuracy and reliability. Therefore, the usage of a swarming robotic system is proposed. In this thesis, a simple framework and methodology in developing a bio-inspired algorithm for cooperative swarming robotic application has been developed. …”
Get full text
Get full text
Thesis -
11
Noise Cancellation using Selectable Adaptive Algorithm for Speech in Variable Noise Environment
Published 2017“…The usage of such methods can be impractical for many real time applications, where speed of convergence and processing time are critical. …”
Get full text
Get full text
Get full text
Article -
12
Security issues of Novel RSA variant
Published 2022“…The RSA is one of the current default cryptosystems that provides security with applications such as encryptions and digital signatures. …”
Get full text
Get full text
Article -
13
MINIMIZATION OF RESOURCE UTILIZATION FOR A REAL-TIME DEPTH-MAP COMPUTATIONAL MODULE ON FPGA
Published 2011“…Depth-map algorithm allows camera system to estimate depth in many applications. …”
Get full text
Get full text
Thesis -
14
-
15
Video content adaptation based on user preferences and network bandwidth / Badariyah Bakhtiar
Published 2007“…Through the algorithm, rule-based technique was used. Based on the experiment results, it is proved that the video content adaptation under e-learning environment can be achieved by the algorithms effectively.…”
Get full text
Get full text
Thesis -
16
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
Get full text
Get full text
Thesis -
17
Optimizing tree planting areas through integer programming and improved genetic algorithm
Published 2012“…The algorithmic solution with some strategies mainly focuses on efficiency. …”
Get full text
Get full text
Thesis -
18
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
Get full text
Get full text
Thesis -
19
Differential evolution for neural networks learning enhancement
Published 2008“…These algorithms can be used successfully in many applications requiring the optimization of a certain multi-dimensional function. …”
Get full text
Get full text
Get full text
Thesis -
20
