Search Results - (( simulation using ((data algorithm) OR (rsa algorithm)) ) OR ( java implication _ algorithm ))
Search alternatives:
- simulation using »
- java implication »
- data algorithm »
- rsa algorithm »
-
1
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security.…”
Get full text
Get full text
Proceeding Paper -
2
RSA authentication mechanisms in control grid computing environment using Gridsim toolkit
Published 2015“…In order to satisfy the security need of grid computing environment, we design an alternative authentication mechanism using RSA algorithm to ensure the user identification, and carry out the experiment in the Gridsim toolkit simulator.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…Therefore, there is a need to protect the fingerprint template, especially in unsecured networks to maintain data privacy and confidentiality. Many past studies proposed fingerprint template protection (FTP) using chaotic-based encryption algorithms that are more suitable to secure images than conventional encryption such as DES, AES, and RSA. …”
Get full text
Get full text
Get full text
Article -
4
-
5
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
Get full text
Get full text
Thesis -
6
K-NN classifier for data confidentiality in cloud computing
Published 2014“…The RSA algorithm is used to encrypt the sensitive data to keep it secure. …”
Get full text
Get full text
Conference or Workshop Item -
7
-
8
Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing
Published 2022“…The Diffie-Hellman key exchange and Rivest Shamir Adleman (RSA) key generation algorithms have been used to authenticate the receiver, and key generation for encrypting and decrypting processes, respectively. …”
Get full text
Get full text
Get full text
Thesis -
9
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
10
HOOPOE: High performance and efficient anonymous handover authentication protocol for flying out of zone UAVs
Published 2023“…The protocol utilizes the advantages of the AES-RSA algorithm to provide efficient and secure key management and a fast verification and signature generation that speeds up drone authentication. …”
Get full text
Get full text
Article -
11
Implementation of New Improved Round Robin (NIRR) CPU scheduling algorithm using discrete event simulation
Published 2015“…The main objective of this research is to validate the NIRR algorithm by developing a comprehensive simulation model using Discrete Event Simulation (DES). …”
Get full text
Get full text
Thesis -
12
Partial encryption of compressed images employing FPGA
Published 2005“…The breadth-first traversal linear lossless quadtree decomposition method is used for the partial compression and RSA is used for the encryption. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Implementation of New Improved Round Robin (NIRR) CPU scheduling algorithm using discrete event simulation
Published 2016“…The main objective of this research is to validate the NIRR algorithm by developing a comprehensive simulation model using Discrete Event Simulation (DES). …”
Get full text
Get full text
Get full text
Article -
14
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Once the calculation of the MAC is completed, only then the MAC will be encrypted. The proposed algorithm was simulated using two processors with one performing the HMAC calculation and the other encrypting the data, simultaneously. …”
Get full text
Get full text
Thesis -
15
Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems
Published 2014“…Conventionally, the numerical simulations for such devices are obtained by using the commercial simulation packages based on the Finite Element Methods (FEM). …”
Get full text
Get full text
Thesis -
16
An Experiment of Ant Algorithms : Case Study of Kota Kinabalu Central Town
Published 2005“…Both algorithms are compared. Simulation is used as a method in this study. …”
Get full text
Get full text
Get full text
Thesis -
17
Enhancing performance of global path planning for mobile robot through Alpha–Beta Guided Particle Swarm Optimization (ABGPSO) algorithm
Published 2025“…Experiments were carried out in four different layouts related to path-planning environments, and comparisons were made with various existing path-planning algorithms. Through extensive simulations across various static environment maps, we demonstrate that the ABGPSO algorithm outperforms existing state-of-the-art optimization techniques, including Genetic Algorithms (GA), Grey Wolf Optimization (GWO), and modern optimizers like the Sine Cosine Algorithm (SCA), Harris Hawks Optimization (HHO) and Reptile search algorithm (RSA). …”
Get full text
Get full text
Get full text
Article -
18
Ant colony optimization for rule induction with simulated annealing for terms selection
Published 2012“…This paper proposes a sequential covering based algorithm that uses an ant colony optimization algorithm to directly extract classification rules from the data set.The proposed algorithm uses a Simulated Annealing algorithm to optimize terms selection, while growing a rule.The proposed algorithm minimizes the problem of a low quality discovered rule by an ant in a colony, where the rule discovered by an ant is not the best quality rule, by optimizing the terms selection in rule construction. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Simulated annealing algorithm for scheduling divisible load in large scale data grids.
Published 2009“…This paper proposes a novel Simulated Annealing (SA) algorithm for scheduling divisible load in large scale data grids. …”
Get full text
Get full text
Article -
20
Optimized clustering with modified K-means algorithm
Published 2021“…Empirical evidences based on simulated data sets indicated that the proposed modified k-means algorithm is able to recognise the optimum number of clusters for uncorrelated data sets. …”
Get full text
Get full text
Get full text
Get full text
Thesis
