Search Results - (( web application rsa algorithm ) OR ( phone application model algorithm ))
Search alternatives:
- phone application »
- application model »
- web application »
- application rsa »
- model algorithm »
- rsa algorithm »
-
1
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and systems as well as web servers and browsers to secure web traffic. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
3
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
4
Genetic case-based reasoning for improved mobile phone faults diagnosis
Published 2018“…GCBR is implemented in a mobile phone fault diagnosis application. This domain is a good testing environment because mobile phones are of various types and models. …”
Get full text
Get full text
Article -
5
-
6
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013“…Our method is based on three stages: 1) define the problem formulation for device heterogeneity; 2) model a mathematical equation for device heterogeneity detection; 3) develop a cloud-based device heterogeneity detection algorithm. …”
Get full text
Get full text
Research Reports -
7
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
8
Text spam messages classification using Artificial Immune System (AIS) algorithms
Published 2024thesis::master thesis -
9
Distracted driver detection with deep convolution neural networks
Published 2023text::Final Year Project -
10
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
11
Gait identification using one-vs-one classifier model
Published 2016“…Lastly, k-NN, MLP and SVM algorithm are compared in determining the best accuracy that works best with the OvO classifier model. …”
Get full text
Get full text
Conference or Workshop Item -
12
-
13
Innovative smart phone learning system for graphical systems within covid-19 pandemic
Published 2023Article -
14
-
15
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…Upon verification, a demonstration application prototype that performs RSA encryption and decryption is developed using Visual Basic 6.0. …”
Get full text
Get full text
Thesis -
16
Enhanced notes capture using super resolution technique on tecogan
Published 2023Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
18
Mobile tour guide application with attraction recognition for UTAR Kampar campus
Published 2021Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
-
20
