Search Results - (( java application matching algorithm ) OR ( using certification protocol algorithm ))
Search alternatives:
- certification protocol »
- application matching »
- using certification »
- protocol algorithm »
- java application »
-
1
-
2
An improved public key cryptography based on the elliptic curve
Published 2002“…Moreover, the new formula can be used more efficiently when it is combined with the suggested sparse elements algorithms. …”
Get full text
Get full text
Thesis -
3
Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure
Published 2022“…These protocols have been successfully used to protect World Wide Web communication between a client and a server that has been encoded using the HTTP protocol for many years. …”
Get full text
Get full text
Get full text
Proceeding -
4
-
5
-
6
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
7
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Rabin-p encryption scheme analysis on MQTT
Published 2023“…However, Rabin-p offers a lower processing algorithm. A conclusion can be made that using Rabin-p in MQTT can help improve the payload security since Rabin-p offers a complex algorithm which is it harder to decrypt the messages when communicating between devices. …”
Get full text
Get full text
Conference or Workshop Item -
9
-
10
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis -
11
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…Also, user attributes are stored in the block storage using an InterPlanetary File System (IPFS) protocol to eliminate the concept of centralizing storage. …”
Get full text
Get full text
Thesis
