Search Results - ((((rsa algorithm) OR (bees algorithm))) OR (((based algorithm) OR (_ algorithm))))
Search alternatives:
- bees algorithm »
- rsa algorithm »
-
1
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013“…This paper will propose i-RSA algorithm, this algorithm is focus on key generation algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Enhance key generation algorithm based user string identity as public key
Published 2015“…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
Get full text
Get full text
Thesis -
3
Enhancement of RSA Key Generation Using Identity
Published 2015“…The purpose of this paper is to enhance previous algorithm called Tripathi algorithm. The Tripathi algorithm proposes an RSA based algorithm to generate cryptographic keys using user identity such as email address of a person. …”
Get full text
Get full text
Get full text
Book Chapter -
4
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006“…This report explains the project of developing Parallel Processing of RSA Algorithm Using MPI Library. RSA Algorithm is a public-key cryptosystem that offers encryption technique which security is based on the difficulty of factoring large prime integers. …”
Get full text
Get full text
Final Year Project -
5
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Hence, how to make a more efficient and faster implementation of Rivest Shamir Adleman algorithm (RSA) is a great concern to researchers in the field of cryptography. …”
Get full text
Get full text
Get full text
Article -
6
Performance Comparison of Parallel Bees Algorithm on Rosenbrock Function
Published 2012“…This thesis presents the parallel Bees Algorithm as a new approach for optimizing the last results for the Bees Algorithm. …”
Get full text
Get full text
Get full text
Thesis -
7
A hybrid algorithm based on artificial bee colony and artificial rabbits optimization for solving economic dispatch problem
Published 2023“…Hence, a hybrid optimization algorithm called Artificial Bee Rabbit Optimization (ABRO) is proposed in this paper. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Comparison of ECC and RSA algorithms in IOT devices
Published 2019“…Based on the findings, the ECC algorithm outperforms RSA in a constrained environment in terms of memory requirements, energy consumption, key sizes, signature generation time, key generation and execution time, and decryption time while RSA performs better in verifying the signature and encrypting.…”
Get full text
Get full text
Article -
9
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
10
Formulation of metaheuristic algorithms based on artificial bee colony for engineering problems
Published 2024“…The Artificial Bee Colony (ABC) algorithm is a powerful metaheuristic optimization technique inspired by the honeybee foraging behaviour. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys
Published 2016Subjects: Get full text
Get full text
Get full text
Thesis -
12
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
13
Bees algorithm enhanced with Nelder and Mead method for numerical function optimisation
Published 2019“…The Bees Algorithm is a population-based optimisation algorithm inspired by the food foraging behaviour of honey bees. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Application of the bees algorithm for constrained mechanical design optimisation problem
Published 2019“…Nowadays, many optimisation algorithms have been introduced due to the advancement of technology such as Teaching Learning Based Optimisation (TLBO), Ant Colony Optimisation (ACO), Particle Swarm Optimisation (PSO) and the Bees Algorithm. …”
Get full text
Get full text
Get full text
Article -
15
Using the bees algorithm to optimise a support vector machine for wood defect classification
Published 2007“…The algorithm, which is a swarm-based algorithm inspired by the food foraging behavior of honey bees, was also employed to select the components making up the feature vectors to be presented to the SVM. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Optimal design of step – cone pulley problem using the bees algorithm
Published 2021“…Most of these algorithms were developed based on the collective behavior of social swarms of ants, bees, a flock of birds, and schools of fish. …”
Get full text
Get full text
Get full text
Get full text
Book Chapter -
17
Leaf lesion classification (LLC) algorithm based on artificial bee colony (ABC)
Published 2015“…In this paper, an algorithm to classify leaf disease severity based on lesions is presented. …”
Get full text
Get full text
Get full text
Article -
18
FPGA Implementation of RSA Public-Key Cryptographic Coprocessor
Published 2000“…The hardware implementation of the RSA algorithm for public-key cryptography is presented. …”
Get full text
Get full text
Article -
19
A comparative review on symmetric and asymmetric dna-based cryptography
Published 2023“…Asymmetric cryptography was considered in the second case by incorporating the DNA codes in RSA algorithm. The efficiencies of DNA coding in OTP, RSA, and other algorithms were given. …”
Article -
20
Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis
Published 2024“…As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. …”
Get full text
Get full text
Get full text
Article
