Search Results - (( web application search algorithm ) OR ( _ application ((rsa algorithm) OR (based algorithm)) ))
Search alternatives:
- application search »
- web application »
- rsa algorithm »
-
1
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…Indexer" to decide and index the relevant web pages, and ''Search algorithm" to retrieve the data from the results of indexing. …”
Get full text
Get full text
Thesis -
3
Genetic Algorithm for Web Data Mining
Published 2001Get full text
Get full text
Project Paper Report -
4
A Hybrid Approach For Web Search Result Clustering Based On Genetic Algorithm With K-means
Published 2024Get full text
journal::journal article -
5
Stemming Algorithm in Searching Malay Text
Published 2004Get full text
Get full text
Get full text
Thesis -
6
Enhance key generation algorithm based user string identity as public key
Published 2015“…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
Get full text
Get full text
Thesis -
7
A hybrid Method Of Centroid-Based Clustering And Meta-Heuristic For Personalized Web Search
Published 2024thesis::doctoral thesis -
8
Malaysia Constitutional Law System, Study On The Use Advanced Searching Algorithm (Rule-Based And Horspool Algorithm)
Published 2017“…In this research, we study about the concept of advanced searching algorithm to build an intelligent web based system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
10
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
11
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…This paper proposes an efficient approach to improve Rivest Shamir Adleman (RSA) algorithm using parallel technique. RSA public-key cryptosystem has been the most popular and interesting security technique for majority of applications such as internet protocols, secure internet acces and electronic commerce. …”
Get full text
Get full text
Get full text
Article -
12
Searching Malay text using stemming algorithm
Published 2004Get full text
Get full text
Get full text
Article -
13
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
15
A new ant based rule extraction algorithm for web classification
Published 2011Get full text
Get full text
Get full text
Get full text
Monograph -
16
FPGA Implementation of RSA Public-Key Cryptographic Coprocessor
Published 2000Get full text
Get full text
Article -
17
ScholarsAid: a personalized scholarship web application based on web scraping/ Muhammad Nur Haqeem Sulaiman and Norhasliza Ahmad
Published 2023“…The web application offers functionality for students to search and filter scholarships to suit their preferences or needs and the most relevant scholarships are provided based on matching algorithm. …”
Get full text
Get full text
Get full text
Article -
18
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
19
A new split based searching for exact pattern matching for natural texts
Published 2018“…Exact pattern matching algorithms are popular and used widely in several applications, such as molecular biology, text processing, image processing, web search engines, network intrusion detection systems and operating systems. …”
Get full text
Get full text
Article -
20
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
Get full text
Get full text
Thesis
