Search Results - (( some applications during algorithm ) OR ( web application rsa algorithm ))*
Search alternatives:
- applications during »
- some applications »
- during algorithm »
- web application »
- application rsa »
- rsa algorithm »
-
1
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and systems as well as web servers and browsers to secure web traffic. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
3
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
4
-
5
Underwater Wireless Sensor Networks: Routing Issues and Future Challenges
Published 2009Get full text
Get full text
Conference or Workshop Item -
6
Underwater Wireless Sensor Networks: Routing Issues and Future Challenges
Published 2009Get full text
Get full text
Conference or Workshop Item -
7
An Efficient Computational Algorithm for Solving Arbitrary Sylvester Matrix Equations in Fuzzy Control Theory (S/O 14179)
Published 2021“…With that, the constructed algorithm is considered as a new contribution to the application of control system theory…”
Get full text
Get full text
Monograph -
8
Early detection of dengue disease using extreme learning machine
Published 2018“…However, back propagation neural network still suffers with some limitations such as slow convergence and easily getting stuck in local minima during training. …”
Get full text
Get full text
Article -
9
Fast handover algorithm for hierarchical mobile IPv6 macro-mobility management
Published 2003Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
-
11
Hybrid HCS-fuzzy mppt algorithm for hydrokinetic energy harnessing
Published 2022“…The fixed stepsize Hill Climbing Search (HCS) algorithm is widely used due to its simplicity. However, the operating point oscillates around the maximum power point (MPP) during dynamic steady-state resulting waste some amount of energy. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
-
13
-
14
-
15
-
16
Water level forecasting using feed forward neural networks optimized by African Buffalo Algorithm (ABO)
Published 2019“…These algorithms have succeeded with different accuracy levels, but it is still suffering from some weaknesses. …”
Get full text
Get full text
Thesis -
17
Fuzzy genetic algorithms for combinatorial optimisation problems
Published 2012Get full text
Get full text
Thesis -
18
-
19
-
20
An enhanced color image encryption algorithm using LT-PRNG
Published 2018“…Thus, the scheme is robust and performed efficiently, and may be used in real-time applications. For future studies, the proposed encryption algorithm can be enhanced by combined compression encryption techniques, which would increase the encryption efficiency. …”
Get full text
Get full text
Thesis
