Search Results - (( wave applications ((bees algorithm) OR (_ algorithm)) ) OR ( some application rsa algorithm ))
Search alternatives:
- wave applications »
- some application »
- application rsa »
- bees algorithm »
- rsa algorithm »
-
1
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…This paper presents the issues and challenges on some key aspects of cryptanalytic attacks on RSA algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
-
3
Security issues of Novel RSA variant
Published 2022“…The RSA is one of the current default cryptosystems that provides security with applications such as encryptions and digital signatures. …”
Get full text
Get full text
Article -
4
Analysis of Rectangular and Circular Wave Guide.
Published 2016Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security.…”
Get full text
Get full text
Proceeding Paper -
6
Gps solution for active queue management using android platform
Published 2021“…Four tickets management applications, namely QueueBee, powerQ, WaveTec and QLess are reviewed to understand both strengths and weaknesses of existing application on current market. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
Published 2006Get full text
Get full text
Thesis -
8
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
9
Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa...
Published 2019“…Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). …”
Get full text
Get full text
Student Project -
10
A true random number generator for crypto embedded systems
Published 2006“…Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES. …”
Get full text
Get full text
Article -
11
-
12
An algorithm for Elliott Waves pattern detection
Published 2018“…They differ in amount of found EW patterns, quality and size. The following application of the developed detection algorithm was based on recognition of an incomplete EW patterns with aim of the prediction of the following progress of the time set. …”
Get full text
Get full text
Article -
13
An algorithm for Elliott Waves pattern detection
Published 2018“…They differ in amount of found EW patterns, quality and size. The following application of the developed detection algorithm was based on recognition of an incomplete EW patterns with aim of the prediction of the following progress of the time set. …”
Get full text
Get full text
Article -
14
Design and implementation of cordic algorithm with sinusoidal pulse width modulation switching strategy
Published 2017“…Usually, one sinusoidal wave is used for one inverter. In this design, SPWM is used for multilevel inverter application in photovoltaic (PV) system. …”
Get full text
Get full text
Student Project -
15
-
16
Market prices trend forecasting supported by Elliott Wave's theory
Published 2017“…The trend prediction is supported by application of recognized Elliot waves which was performed by custom developed algorithm based on available knowledge about the patterns. …”
Get full text
Get full text
Article -
17
Modelling of tsunami wave spectra propagation run-up in Sri-Lanka and Indonesia
Published 2006Get full text
Get full text
Conference or Workshop Item -
18
Simulation of Tsunami Wave Spectra on Sri Lanka and Indonesia
Published 2006Get full text
Get full text
Article -
19
Simulation of Tsunami Wave Spectra on Sri-Lanka and Indonesia
Published 2006Get full text
Get full text
Article -
20
Quasi linear algorithm for modelling shoreline change from AIRSAR/POLSAR polarized data
Published 2007Get full text
Get full text
Conference or Workshop Item
