Search Results - (( intelligence _ rsa algorithm ) OR ( intelligence based cp algorithm ))
Search alternatives:
- intelligence based »
- rsa algorithm »
- cp algorithm »
- based cp »
-
1
Privacy in medical emergency system: cryptographic and security aspects
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
2
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
3
Inverse kinematic solution in handling 3R manipulator via real-time genetic algorithm
Published 2023Conference paper -
4
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
5
-
6
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
8
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The simulation results show the AMS algorithm significantly improves the performance over RSA-MSDU and the standard for real-time traffic in terms of reducing average delay and packet loss up to 56% and 24% respectively. …”
Get full text
Get full text
Thesis -
9
-
10
-
11
-
12
Stereo matching algorithm based on deep learning: a survey
Published 2022Get full text
Get full text
Get full text
Article
