Search Results - (( web application modified algorithm ) OR ( _ application ((rsa algorithm) OR (new algorithm)) ))
Search alternatives:
- application modified »
- web application »
- rsa algorithm »
- new algorithm »
-
1
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Enhance key generation algorithm based user string identity as public key
Published 2015“…This algorithm uses a user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
Get full text
Get full text
Thesis -
3
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
4
-
5
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
6
New algorithm for attitude and orbit determination using magnetic field measurements
Published 2015Get full text
Get full text
Get full text
Proceeding Paper -
7
New approach of cryptography algorithm for e- mail applications
Published 2005“…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
Get full text
Get full text
Conference or Workshop Item -
8
CHAOS AND PUBLIC KEY INFRASTRUCTURE (PKI)
Published 2004Get full text
Get full text
Final Year Project -
9
-
10
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
Get full text
Get full text
Thesis -
11
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
12
An improved public key cryptography based on the elliptic curve
Published 2002“…To speed up the underlying finite field operations, several new algorithms are introduced namely: selecting random sparse elements algorithm, finding sparse base points, sparse multiplication over polynomial basis, and sparse multiplication over normal basis. …”
Get full text
Get full text
Thesis -
13
Encryption Technology on Windows Workstation
Published 2004Get full text
Get full text
Final Year Project -
14
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
15
-
16
New vulnerability of RSA modulus type N = p2q
Published 2017Get full text
Get full text
Get full text
Article -
17
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
Published 2013Get full text
Get full text
Conference or Workshop Item -
18
Cryptanalysis on prime power RSA modulus of the form N=prq
Published 2016Get full text
Get full text
Article -
19
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
A modified π rough k-means algorithm for web page recommendation system
Published 2018“…In order to tackle above problem, a modified algorithm for Web page recommendation is proposed. …”
Get full text
Get full text
Get full text
Thesis
