Search Results - (( processes specification rsa algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- processes specification »
- customization algorithm »
- specification rsa »
- java application »
- rsa algorithm »
-
1
Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis
Published 2024“…This paper presents a comparative analysis of different variants of the RSA cryptosystem, focusing on five specific cryptosystems: RSA, Somsuk-RSA, Modified-RSA (MRSA), Easy Simple Factoring-RSA (ESF-RSA), and Phony-RSA. …”
Get full text
Get full text
Get full text
Article -
2
Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis
Published 2024“…This paper presents a comparative analysis of different variants of the RSA cryptosystem, focusing on five specific cryptosystems: RSA, Somsuk-RSA, Modified-RSA (MRSA), Easy Simple Factoring-RSA (ESF-RSA), and Phony-RSA. …”
Get full text
Get full text
Get full text
Article -
3
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
Get full text
Get full text
Thesis -
4
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
Get full text
Get full text
Conference or Workshop Item -
5
A study of watermarking methods in medical application
Published 2004“…Among these three methods, LSB method has the most capacity of watermark and fastest rate in embedding process. These three algorithms implemented in this project are shown to be sensitive for the attack. …”
Get full text
Get full text
Thesis -
6
A lightweight and secure online/offline cross-domain authentication scheme for VANET systems in Industrial IoT
Published 2021“…The proposed scheme utilizes an efficient AES-RSA algorithm to achieve integrity and confidentiality of the message. …”
Get full text
Get full text
Article -
7
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
8
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
