Search Results - (( developing public computer algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- java implication »
- public computer »
-
1
Development of Algorithm for QoS Model in Cloud Computing
Published 2021Get full text
Get full text
Get full text
Article -
2
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006“…The scope of this project is developing a parallel system to generate public and private key, and to encrypt and decrypt files using the algorithm of RSA. …”
Get full text
Get full text
Final Year Project -
3
A genetic algorithm for the cryptanalysis of Chor-Rivest knapsack public key cryptosystem (PKC)
Published 1999Get full text
Get full text
Get full text
Proceeding Paper -
4
-
5
-
6
Trend analysis of software engineering scientific publications
Published 2019Get full text
Get full text
Get full text
Undergraduates Project Papers -
7
Development of some fast and efficient methods for elliptic curve scalar multiplication over prime fields
Published 2015“…Elliptic curve cryptosystem (ECC) is being used nowadays more than ever to fulfill the need for public key cryptosystem because of its ability to use shorter keys lengths and computationally more efficient algorithms than anther public key cryptosystems such as Rivest-Shamir- Adleman (RSA), Digital Signature Algorithm (DSA) and ElGamal. …”
Get full text
Get full text
Get full text
Thesis -
8
Development of symbolic algorithms for certain algebraic processes
Published 2007Get full text
Get full text
Get full text
Monograph -
9
-
10
The shortest route of the potential companies for internship using Dijkstra’s Algorithm / Mohamad Khairul Ikhwan Mohd Radzi
Published 2017“…Technological development also affects the detection field. Today many methods invented by experts in technology to facilitate the public to make any finding on whether static or dynamic detection. …”
Get full text
Get full text
Thesis -
11
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…Lastly the project has the objective to deploy and a grid computing facility that will beuse as a test bed for RSA algorithm Methodology used for the development is Rapid Application Development (RAD) as it will allow for fast development with a series of testing and prototyping. …”
Get full text
Get full text
Final Year Project -
12
A filtering algorithm for efficient retrieving of DNA sequence
Published 2009“…An automaton-based algorithm is used to develop the filtering process proposed. …”
Get full text
Get full text
Get full text
Article -
13
Visual Public-Key Cryptosystems.
Published 2012“…However, most of the existing public-key algorithms are based on complex mathematical computations. …”
Get full text
Get full text
Monograph -
14
A simulation software for DNA computing algorithms implementation
Published 2010Get full text
Get full text
Get full text
Article -
15
Computation of cryptosystem based on Lucas functions using addition chain
Published 2010“…Lucas Functions are the special form of second-order linear recurrence relation using a large public integer as modulus. In this paper, an efficient computation algorithm for LUC Cryptosystem is developed. …”
Get full text
Get full text
Conference or Workshop Item -
16
Porting SIMRJGSA Algorithms For Mapping And Alignment To Malay-English Bitexts.
Published 2001Get full text
Get full text
Conference or Workshop Item -
17
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…The main problem in traditional cryptosystem is a public key in determining validity, but this problem can be solved by identity based cryptography, where the public key can be obtained from users of public information known users. …”
Get full text
Get full text
Conference or Workshop Item -
18
-
19
A hybrid database encryption algorithm based on reverse string and dynamic key
Published 2016“…Personal computers has become one of the important part of human life, especially when they using the Internet or any public networks.So, the information or data may still be deliberately or inadvertently leaked out by the insiders or customers.In this paper, we proposing new algorithm to protect any type of data, depending on the substitution techniques, using dynamic key (DK) and reveres string for each character in the text (or field in the file of the database) and each string .A special equation was developed to generate the DK, it’s depend on the length of string, order the character in the string,ASCII code of the character, and string sequence.The proposed algorithm using the reverse string before encryption, also, there are two actions after that, for the purpose of increasing the complexity of the algorithm.The results showed that The developed algorithm was successes to remove any duplicate encryption, for each character and each record even when the text duplicated.…”
Get full text
Get full text
Conference or Workshop Item -
20
