Search Results - (( web application rsa algorithm ) OR ( _ application ((out algorithm) OR (acs algorithm)) ))
Search alternatives:
- web application »
- application rsa »
- rsa algorithm »
- out algorithm »
- acs algorithm »
-
1
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and systems as well as web servers and browsers to secure web traffic. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
3
-
4
Investigation of various algorithms on multichannel audio compression
Published 2017Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
-
6
Improvement DACS3 Searching Performance using Local Search
Published 2009Get full text
Get full text
Conference or Workshop Item -
7
-
8
Parallel matrix-multiplication algorithm on network of workstations
Published 2004“…However, these types of algorithms often carried out on expensive supercomputers or multiprocessing systems. …”
Get full text
Get full text
Get full text
Article -
9
-
10
Fast algorithm for VQ-based wavelet coding system
Published 2003Get full text
Get full text
Get full text
Proceeding Paper -
11
-
12
-
13
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024“…The dataset development for both algorithms is carried out via simulations in Graphical Network Simulator 3 (GNS3). …”
Article -
14
-
15
Quality Of Service Provisioning Scheme For Real-Time Applications in IEEE 802.11 Wireless Local Area Network
Published 2006“…SNT-AC uses an admission control algorithm to restrict flows in and out of the BSS. …”
Get full text
Get full text
Thesis -
16
-
17
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
18
Solving fuzzy-facilities layout problem using genetic algorithm
Published 2013Get full text
Get full text
Get full text
Proceeding Paper -
19
-
20
Adopting AHP in evaluating nurse scheduling methods
Published 2004“…Consequently, the memetic algorithm approach stands out to be the better one based on the evaluation scheme.…”
Get full text
Get full text
Get full text
Article
