Search Results - (( some applications rsa algorithm ) OR ( _ application ((out algorithm) OR (acs algorithm)) ))
Search alternatives:
- some applications »
- applications rsa »
- rsa algorithm »
- out algorithm »
- acs algorithm »
-
1
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…This paper presents the issues and challenges on some key aspects of cryptanalytic attacks on RSA algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
-
3
-
4
Security issues of Novel RSA variant
Published 2022“…The RSA is one of the current default cryptosystems that provides security with applications such as encryptions and digital signatures. …”
Get full text
Get full text
Article -
5
Investigation of various algorithms on multichannel audio compression
Published 2017Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security.…”
Get full text
Get full text
Proceeding Paper -
7
-
8
Improvement DACS3 Searching Performance using Local Search
Published 2009Get full text
Get full text
Conference or Workshop Item -
9
-
10
Parallel matrix-multiplication algorithm on network of workstations
Published 2004“…However, these types of algorithms often carried out on expensive supercomputers or multiprocessing systems. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Fast algorithm for VQ-based wavelet coding system
Published 2003Get full text
Get full text
Get full text
Proceeding Paper -
13
-
14
-
15
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024“…The dataset development for both algorithms is carried out via simulations in Graphical Network Simulator 3 (GNS3). …”
Article -
16
Simulation of quantum growing network / Ong Boon Teong
Published 2003Get full text
Get full text
Thesis -
17
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
Published 2006Get full text
Get full text
Thesis -
18
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
19
-
20
Quality Of Service Provisioning Scheme For Real-Time Applications in IEEE 802.11 Wireless Local Area Network
Published 2006“…SNT-AC uses an admission control algorithm to restrict flows in and out of the BSS. …”
Get full text
Get full text
Thesis
