Search Results - (( wave application ((amh algorithm) OR (acs algorithm)) ) OR ( web application rsa algorithm ))
Search alternatives:
- wave application »
- web application »
- application rsa »
- amh algorithm »
- acs algorithm »
- rsa algorithm »
-
1
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and systems as well as web servers and browsers to secure web traffic. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
3
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
4
Evaluation of reference signal estimation techniques for the control of shunt active power filter
Published 2023Conference paper -
5
-
6
-
7
-
8
-
9
-
10
Field theory analysis for wireless infrared system's error correction
Published 2014Get full text
Get full text
Conference or Workshop Item -
11
-
12
-
13
Handover Management Over Dual Connectivity In 5g Technology With Future Ultra-dense Mobile Heterogeneous Networks: A Review
Published 2024journal::journal article -
14
-
15
