Search Results - (( simulation study rsa algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- java implication »
- rsa algorithm »
- study rsa »
-
1
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…There are several security schemes implemented using hardware or software trying to solve the problem of security in WSN by taking into consideration the limitations of sensors (bandwidth and energy), the majority of them are symmetric key encryption schemes and some others are asymmetric encryption schemes is not recommended to be used because of high time complexity and consumption demand. In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. …”
Get full text
Get full text
Proceeding Paper -
2
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…The results from the study are being compared to the mathematical simulation, and experimentally, to the RSA. …”
Get full text
Get full text
Thesis -
3
-
4
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…Hence, this study aims to improve the limitations found in the existing chaotic-based encryption algorithms for FTP by improving its encryption speed using Henon and Logistic map. …”
Get full text
Get full text
Get full text
Article -
5
-
6
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
7
Enhancing land cover classification in remote sensing imagery using an optimal deep learning model
Published 2023“…hyperparameter selection is accomplished with the help of the Reptile Search Algorithm (RSA). The simulation analysis was conducted upon the ISCSODL-LCC model using two benchmark datasets and the results established the superior performance of the proposed model. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article
