Search Results - (( java implication based algorithm ) OR ( model implementation rsa algorithm ))
Search alternatives:
- model implementation »
- implementation rsa »
- implication based »
- java implication »
- rsa algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
2
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
Get full text
Get full text
Thesis -
3
AAβ public key cryptosystem - a comparative analysis against RSA and ECC
Published 2012“…This paper aims to provide a comparative analysis between probabilistic and deterministic security models. We provide a benchmark by practically implementing and comparing three ciphers - AAβ, RSA and ECC. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
5
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
6
Modified multi-prime RSA using discriminant of a quadratic and Chinese remainder theorem / Nur Fatimah Kabulanto and Farah Aina Abdul Razak
Published 2018“…In order to achieving security from unwanted users, the message will encode to make it unreadable format. RSA Cryptosystem is generally utilized in the popular implementation of public key Cryptosystem. …”
Get full text
Get full text
Student Project -
7
Two-stage feature selection using ranking self-adaptive differential evolution algorithm for recognition of acceleration activity
Published 2018“…Consequently, this paper proposes a ranking self-adaptive differential evolution (rsaDE) feature selection algorithm. The proposed algorithm is capable of selecting the optimal feature subsets while improving the recognition of acceleration activity using a minimum number of features. …”
Get full text
Get full text
Get full text
Article -
8
Digital Certificate-based Authentication Model For Enhanced Smartphone Security
Published 2025journal::journal article -
9
Digital certificate-based authentication model for enhanced smartphone security / A. H. Azni, Sakiinah Altaf Hussain and Najwa Hayaati Mohd Alwi
Published 2025“…The model employs the RSA algorithm to generate encryption keys and authenticate user and device identities. …”
Get full text
Get full text
Get full text
Article -
10
Data classification based on confidentiality in virtual cloud environment
Published 2014“…After implementing the proposed model, it is found that the confidentiality level of data is increased and this model is proved to be more cost and memory friendly for the users as well as for the cloud services providers. …”
Get full text
Get full text
Article -
11
-
12
Simulation of quantum growing network / Ong Boon Teong
Published 2003“…Should it be possible to build a microprocessor which fully exploits quantum mechanics then it may be possible to carry out such factorisations in remarkably less time. The RSA algorithm, a widely used encryption system, is safe only if such factorisations cannot be performed quickly. …”
Get full text
Get full text
Thesis -
13
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis
