Search Results - (( java implication based algorithm ) OR ( network application rsa algorithm ))
Search alternatives:
- implication based »
- java implication »
- application rsa »
- rsa algorithm »
-
1
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…The RSA algorithm can be used for both public key encryption and digital signatures. …”
Get full text
Get full text
Final Year Project -
2
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…The need of security to protect the data through networks has become of vital importance and critical for many sensor network applications. …”
Get full text
Get full text
Proceeding Paper -
3
-
4
-
5
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012Get full text
Get full text
Conference or Workshop Item -
6
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…The performance proposed encryption algorithm was promising which could be a starting point for detailed analysis and implementation in real application domains.…”
Get full text
Get full text
Get full text
Article -
7
Developing a secure mechanism for Bluetooth-based Wireless Personal Area Networks (WPANs)
Published 2007“…Our work involves developing a prototype for Bluetooth systems using RSA and DSA encryption algorithms. An analysis was done to ascertain which of these algorithms is more suited to our proposed security framework and the results indicated that in most instances, the RS A performed better.…”
Get full text
Get full text
Get full text
Proceeding Paper -
8
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
Published 2013Get full text
Get full text
Conference or Workshop Item -
9
Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa...
Published 2019“…Cryptography consists of some algorithms but the most common algorithms that had been used are Elliptic Curve Cyptography (ECC) and Rivest-Shamir-Adleman (RSA). …”
Get full text
Get full text
Student Project -
10
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…This thesis presents four main contributions for QoS provisioning that are robust, scalable, and can be successfully implemented in WLAN networks. The first contribution is the AMS scheduling algorithm. …”
Get full text
Get full text
Thesis -
11
-
12
Encryption method for SCADA security enhancement
Published 2014Get full text
Get full text
Get full text
Article -
13
-
14
-
15
Simulation of quantum growing network / Ong Boon Teong
Published 2003Get full text
Get full text
Thesis -
16
Enhancing land cover classification in remote sensing imagery using an optimal deep learning model
Published 2023“…By leveraging the abilities of Deep Neural Networks (DNNs) namely, Convolutional Neural Networks (CNN) or Recurrent Neural Networks (RNN), the technology can autonomously learn spatial and spectral features inherent to the RSI. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
17
Performance evaluation of lightweight Crypto functions for Internet of things applications
Published 2020“…The conventional cryptography methods, such for Advanced Encryption Standard (AES), Secure Hash Algorithm (SHA) and Rivest–Shamir–Adleman, (RSA), work well on systems which have reasonable processing power and memory capabilities. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis
