Search Results - (( solution implementation rsa algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- solution implementation »
- customization algorithm »
- implementation rsa »
- java application »
- rsa algorithm »
-
1
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…Performance has always been the most critical characteristic of a cryptographic algorithm, which determines its effectiveness. In this research the most popular and used algorithm, which is RSA, is implemented with a new modification in order to reduce the calculation time of the algorithm. …”
Get full text
Get full text
Thesis -
2
-
3
-
4
Crypto Embedded System for Electronic Document
Published 2006“…The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
Get full text
Get full text
Article -
5
Encryption method for SCADA security enhancement
Published 2014“…The proposed security solutions takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within distributed network protocol (DNP3) stack. …”
Get full text
Get full text
Get full text
Article -
6
Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon
Published 2017“…Related work was surveyed in digital watermarking, cryptography and design methodology before implementing the text based watermarking method (embedded and extract/detection of watermarks).The implementation results on text based digital watermarking combined with cryptographic techniques are presented. …”
Get full text
Get full text
Get full text
Thesis -
7
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…This thesis presents four main contributions for QoS provisioning that are robust, scalable, and can be successfully implemented in WLAN networks. The first contribution is the AMS scheduling algorithm. …”
Get full text
Get full text
Thesis -
8
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
9
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
