Search Results - (( web application rsa algorithm ) OR ( wave application ((ria algorithm) OR (tree algorithm)) ))*

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and systems as well as web servers and browsers to secure web traffic. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…Here, we introduce a measure of similarity based on the circular distance and obtain a cluster tree using the single linkage clustering algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    An Accurate and Efficient Shooting-and-bouncing-polygon Ray Tracer For Radio Propagation Modelling by Teh, Chin Hui

    Published 2019
    “…SBP-CCP simulation results also show very good match (2 dB rootmean-square error) to full-wave solutions computed using CST Microwave.Studio time domain solver, in an indoor application with reflection, transmission, diffraction, and lossy walls with thickness. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6