Search Results - (( web application ((acs algorithm) OR (bat algorithm)) ) OR ( web application rsa algorithm ))*
Search alternatives:
- web application »
- application rsa »
- acs algorithm »
- bat algorithm »
- rsa algorithm »
-
1
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and systems as well as web servers and browsers to secure web traffic. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…This research will conduct comparison of hybrid Genetic Algorithm and Bat Algorithm (GA-BA) with Genetic Algorithm (GA) and Bat Algorithm (BA). …”
Get full text
Get full text
Get full text
Academic Exercise -
3
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
4
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
5
-
6
A Mobile Web Application Engine for Generating Destination-oriented LRT Route
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
7
-
8
-
9
-
10
