Search Results - (( data practical encryption algorithm ) OR ( java application optimization algorithm ))

Refine Results
  1. 1
  2. 2

    Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security by H. Belgassem, Seddeq

    Published 2004
    “…Performance has always been the most critical characteristic of a cryptographic algorithm, which determines its effectiveness. In this research the most popular and used algorithm, which is RSA, is implemented with a new modification in order to reduce the calculation time of the algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A survey of homomorphic encryption for outsourced big data by Tan, Soo Fun, Azman Samsudin

    Published 2016
    “…Finally, this paper discusses the current implementation, challenges, and future direction towards a practical homomorphic encryption scheme for securing outsourced Big Data computation.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Implementation of Grid Computing for Cryptosystem (RSA) by Abd Wahab, Mohamed Ferdaus

    Published 2005
    “…The RSA algorithm can be used for both public key encryption and digital signatures. …”
    Get full text
    Get full text
    Final Year Project
  6. 6
  7. 7

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Comparison of ECC and RSA algorithms in IOT devices by Vahdati, Zeinab, Md Yasin, Sharifah, Nesheli, Ali Ghasempour, Salehi, Mohammad

    Published 2019
    “…Hence, thoughtfully chosen and practically tested encryption algorithm must be performed to enhance the device efficiency and decrease the risk of sensitive data exposure. …”
    Get full text
    Get full text
    Article
  9. 9

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  10. 10
  11. 11
  12. 12

    AAβ public-key cryptosystem - a practical implementation of the new asymmetric by Mahad, Zahari, Kamel Ariffin, Muhammad Rezal

    Published 2013
    “…We show the working of the AAβ algorithm purely from a practical standpoint to justify if it is practically implementable even for large data sets operating on large key sizes.…”
    Get full text
    Get full text
    Article
  13. 13

    Verilog design of a 256-bit AES crypto processor core by Lai, Yit Pin

    Published 2007
    “…Cryptography is the practice to protect one’s information through encryption. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    AAβ public key cryptosystem - a new practical asymmetric implementation based on the square root problem by Mahad, Zahari, Kamel Ariffin, Muhammad Rezal

    Published 2012
    “…We show the working of the AAβ algorithm purely from a practical standpoint to justify if it is practically implementable even for large data sets operating on large key sizes.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Cryptographic Algorithm Using Matrix Inversion as Data Protection by Zirra, Peter B., Wajiga, G.M.

    Published 2011
    “…The algorithms were tested with samples of real data and the result practically demonstrated how systems of non-linear equations turned into linear equations are indeed of relevance in providing strong and complex encryption and decryption keys to protect sensitive information in store or in transit via unsecure channels. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Feasibility of quantum cryptography with AES for secure communication by Mustaffa, Nurul Muzfirah, Mat Daud, Nurulain Balqis, Sase, Takumi

    Published 2026
    “…Traditional encryption techniques face serious threats from the rapid development of quantum computing, which could soon compromise many classical algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    A Hybrid Chaotic Image Encryption Scheme Bas~d on S-Box and Ciphertext Feedback by MUHAMMAD ASIM

    Published 2007
    “…Due to some intrinsic features of images, such as bulk data capacity and high correlation among pixels, traditional encryption algorithms such as IDEA, DES and AES are not suitable for practical image encryption, especially for real time applications. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT by Abdullah, Amran

    Published 2006
    “…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
    Get full text
    Get full text
    Thesis