Search Results - (( developing application rsa algorithm ) OR ( java application design algorithm ))
Search alternatives:
- developing application »
- application design »
- java application »
- design algorithm »
- application rsa »
- rsa algorithm »
-
1
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006Get full text
Get full text
Final Year Project -
2
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…Lastly the project has the objective to deploy and a grid computing facility that will beuse as a test bed for RSA algorithm Methodology used for the development is Rapid Application Development (RAD) as it will allow for fast development with a series of testing and prototyping. …”
Get full text
Get full text
Final Year Project -
3
-
4
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…Embedded C language codes are then written to test the functionality of the RSA co-processor on hardware. Upon verification, a demonstration application prototype that performs RSA encryption and decryption is developed using Visual Basic 6.0. …”
Get full text
Get full text
Thesis -
5
Enhance key generation algorithm based user string identity as public key
Published 2015“…In this experiment, an algorithm called the CLB-RSA was developed. Classifications of decimal values to determine whether the E-mail entered contains odd or even numbers were added to this algorithm. …”
Get full text
Get full text
Thesis -
6
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
7
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
8
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
9
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
Get full text
Get full text
Thesis -
10
Crypto Embedded System for Electronic Document
Published 2006“…The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
Get full text
Get full text
Article -
11
Encryption Technology on Windows Workstation
Published 2004Get full text
Get full text
Final Year Project -
12
A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim
Published 2012“…Many previous researches focused on elliptic curve and its applications in mobile communication. The purpose of the qualitative study is to explore and develop basic understanding of the properties of the families of Edwards curves, one of the special forms of elliptic curves, and their applications in cryptography, using grounded theory approach, in which the data are hand-analyzed, coded and grouped into themes under study. …”
Get full text
Get full text
Research Reports -
13
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
14
-
15
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
16
-
17
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
Get full text
Get full text
Thesis -
18
Developing a secure mechanism for Bluetooth-based Wireless Personal Area Networks (WPANs)
Published 2007“…The use of digital signatures and trusted or certified public keys form the basic premise and approach in this work in providing stronger security for WPANs. Our work involves developing a prototype for Bluetooth systems using RSA and DSA encryption algorithms. …”
Get full text
Get full text
Get full text
Proceeding Paper -
19
New approach of cryptography algorithm for e- mail applications
Published 2005“…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
Get full text
Get full text
Conference or Workshop Item -
20
