Search Results - (( web application ((search algorithm) OR (path algorithm)) ) OR ( its application rsa algorithm ))
Search alternatives:
- web application »
- its application »
- application rsa »
- path algorithm »
- rsa algorithm »
-
1
-
2
-
3
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). The symmetric key will be generated by application tier and be encrypted by RSA algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
5
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
6
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
7
Genetic Algorithm for Web Data Mining
Published 2001Get full text
Get full text
Project Paper Report -
8
-
9
A Hybrid Approach For Web Search Result Clustering Based On Genetic Algorithm With K-means
Published 2024Get full text
journal::journal article -
10
A new algorithm to measure relevance among Web pages
Published 2006“…RWP increases the search efficiency effectively and enhances the application area of Web related research.…”
Get full text
Get full text
Get full text
Article -
11
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…Indexer" to decide and index the relevant web pages, and ''Search algorithm" to retrieve the data from the results of indexing. …”
Get full text
Get full text
Thesis -
12
A hybrid Method Of Centroid-Based Clustering And Meta-Heuristic For Personalized Web Search
Published 2024thesis::doctoral thesis -
13
Partial key attack given MSBs of CRT-RSA private keys
Published 2020“…The CRT-RSA cryptosystem is the most widely adopted RSA variant in digital applications. …”
Get full text
Get full text
Article -
14
On (unknowingly) using near-square RSA primes
Published 2022“…Since its inception, the RSA cryptosystem has become embedded in millions of digital applications with the objectives of ensuring confidentiality, integrity, authenticity, and disallowing repudiation. …”
Get full text
Get full text
Article -
15
Stemming Algorithm in Searching Malay Text
Published 2004Get full text
Get full text
Get full text
Thesis -
16
Searching Malay text using stemming algorithm
Published 2004Get full text
Get full text
Get full text
Article -
17
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…In the modern digital era, the Web has been utilized for searching information by using different search engines (SE) as a tool. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Text Extraction Algorithm for Web Text Classification
Published 2010“…A text extraction prototype is built using Visual C# 2008 to validate the algorithm. It is a windows application mixed with web connection protocol. …”
Get full text
Get full text
Get full text
Thesis -
19
Malaysia Constitutional Law System, Study On The Use Advanced Searching Algorithm (Rule-Based And Horspool Algorithm)
Published 2017“…In this research, we study about the concept of advanced searching algorithm to build an intelligent web based system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
