Search Results - (( developing subjective encryption algorithm ) OR ( java implication tree algorithm ))

  • Showing 1 - 4 results of 4
Refine Results
  1. 1
  2. 2

    Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure by Asbullah, Muhammad Asyraf

    Published 2015
    “…Rabin cryptosystem has fast encryption and proven as secure as the integer factorization problem. …”
    Get full text
    Get full text
    Thesis
  3. 3

    An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network by Ramli, Sofia Najwa

    Published 2016
    “…While the result of FFT algorithm summarizes that the number of the common FFT peak location index for sensors on the same subject is significantly higher compared to the number of common feature for sensors on different subjects.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Design and implementation of a private and public key crypto processor for next-generation it security applications by Hani, Mohamed Khalil, Wen, Hau Yuan, Paniandi, Arul

    Published 2006
    “…Consequently, these IT security issues have been a subject of intensive research in areas of computing, networking and cryptography these last few years. …”
    Get full text
    Get full text
    Get full text
    Article