Search Results - (( program using rsa algorithm ) OR ( wave application using algorithm ))
Search alternatives:
- wave application »
- using algorithm »
- program using »
- rsa algorithm »
- using rsa »
-
1
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
2
Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis
Published 2024“…Firstly, they examined each algorithm of the RSA variants and analysed them according to the proposed methodology. …”
Get full text
Get full text
Get full text
Article -
3
Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis
Published 2024“…Firstly, they examined each algorithm of the RSA variants and analysed them according to the proposed methodology. …”
Get full text
Get full text
Get full text
Article -
4
-
5
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The study recommends to use another type of digital signature algorithm to be used in the proposed method. …”
Get full text
Get full text
Student Project -
6
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…It is not done only by encrypting it but also providing access to the data only on successful authentication. ECC, AES, and RSA algorithms will be used to encrypt the files to enhance security data on the cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
7
Encryption Technology on Windows Workstation
Published 2004“…This study is done because current encryption method in Windows environment is quite weak (e.g.: Windows password) and easily breakable using program like LC4(@stake LC4, about). Windows NT, 2000 and XP use Security Accounts Manager (SAM) file to store encrypted users passwords using RSA MD4 scheme(Windows NT SAM permission Vulnerability, bulletin), so if the RSA technique is enhanced it will enable a stronger and harder to break workstations. …”
Get full text
Get full text
Final Year Project -
8
Crypto Embedded System for Electronic Document
Published 2006“…The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
Get full text
Get full text
Article -
9
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
10
-
11
-
12
Design and implementation of cordic algorithm with sinusoidal pulse width modulation switching strategy
Published 2017“…Usually, one sinusoidal wave is used for one inverter. In this design, SPWM is used for multilevel inverter application in photovoltaic (PV) system. …”
Get full text
Get full text
Student Project -
13
-
14
Modelling of tsunami wave spectra propagation run-up in Sri-Lanka and Indonesia
Published 2006Get full text
Get full text
Conference or Workshop Item -
15
Simulation of Tsunami Wave Spectra on Sri Lanka and Indonesia
Published 2006Get full text
Get full text
Article -
16
Simulation of Tsunami Wave Spectra on Sri-Lanka and Indonesia
Published 2006Get full text
Get full text
Article -
17
-
18
Quasi linear algorithm for modelling shoreline change from AIRSAR/POLSAR polarized data
Published 2007Get full text
Get full text
Conference or Workshop Item -
19
Random traveling wave pulse coupled oscillator (RTWPCO) algorithm of energy-efficient wireless sensor networks
Published 2018“…To avert this problem, this study proposes a new mechanism called random traveling wave pulse-coupled oscillator algorithm, which is a self-organizing technique for energy-efficient wireless sensor networks using the phase-locking traveling wave pulse-coupled oscillator and random method on anti-phase of the pulse-coupled oscillator model. …”
Get full text
Get full text
Article -
20
Pattern Recognition Approach Of Stress Wave Propagation In Carbon Steel Tubes For Defect Detection
Published 2015“…Several high frequency stress wave signals propagated in the tubes due to impact are captured using Acoustic Emission method. …”
Get full text
Get full text
Get full text
Article
