Search Results - (( web applications a algorithm ) OR ( some applications ((rsa algorithm) OR (_ algorithm)) ))
Search alternatives:
- some applications »
- web applications »
- applications a »
- rsa algorithm »
- a algorithm »
-
1
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
-
3
Security issues of Novel RSA variant
Published 2022“…The RSA is one of the current default cryptosystems that provides security with applications such as encryptions and digital signatures. …”
Get full text
Get full text
Article -
4
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security.…”
Get full text
Get full text
Proceeding Paper -
5
Web application vulnerabilities detection model
Published 2016“…The algorithm is used in order to match the defined criteria of each web vulnerability with the input information about web application. …”
Get full text
Get full text
Research Reports -
6
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
7
Web based clustering tool using K-MEAN++ algorithm / Muhammad Nur Syazwanie Aznan
Published 2019“…Which is why this project objective is to develop a web based clustering tool using K-MEAN++ algorithm. …”
Get full text
Get full text
Thesis -
8
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Although the web tool has some limitation which it can hold back the user experience on this web tool, but there are always room for improvement.…”
Get full text
Get full text
Thesis -
9
Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa...
Published 2019“…Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). …”
Get full text
Get full text
Student Project -
10
The Fourth Order Linear Recurrence Sequence For RSA Type Cryptosystem
Published 2006Get full text
Get full text
Thesis -
11
Intelligent Web caching using neurocomputing and particle swarm optimization algorithm
Published 2008Get full text
Get full text
Get full text
Conference or Workshop Item -
12
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
14
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
15
School teacher-subject allocation management system
Published 2024“…This project will build STSAMS as a web-based application in React.js that is equipped with API server, database, and the allotment algorithm with the Scrum methodology. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The algorithm exploits all interests and preferences in a hierarchy tree structure. …”
Get full text
Get full text
Thesis -
17
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…Thus, overall aim of this research is to introduce new grid scheduling algorithms for resource allocation as well as for job scheduling for enabling a highly efficient and effective utilization of the resources in executing various applications. …”
Get full text
Get full text
Thesis -
18
A true random number generator for crypto embedded systems
Published 2006“…Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES. …”
Get full text
Get full text
Article -
19
-
20
Marine Predator Algorithm and Related Variants: A Systematic Review
Published 2025“…The study expounded the classical MPA’s workflow. It also unveiled a steady upward trend in the use of the algorithm. …”
Get full text
Get full text
Article
