Search Results - (( solution using ((rsa algorithm) OR (new algorithm)) ) OR ( java implication _ algorithm ))
Search alternatives:
- java implication »
- solution using »
- rsa algorithm »
- new algorithm »
-
1
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…Performance has always been the most critical characteristic of a cryptographic algorithm, which determines its effectiveness. In this research the most popular and used algorithm, which is RSA, is implemented with a new modification in order to reduce the calculation time of the algorithm. …”
Get full text
Get full text
Thesis -
2
-
3
An improved public key cryptography based on the elliptic curve
Published 2002“…A new algorithm to compress and decompress the sparse elements algorithms are introduced to reduce the size of the transited parameters. …”
Get full text
Get full text
Thesis -
4
Performance analysis and improvement of rabin primitive based cryptosystems
Published 2014“…While in the decryption process, it involves the mathematical solution method using Chinese Remainder Theorem that produces four different answers where only one correct answer need to be determined by user. …”
Get full text
Get full text
Get full text
Thesis -
5
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
Get full text
Get full text
Get full text
Article -
6
Secured electrocardiograph (ECG) signal using partially homomorphic encryption technique–RSA algorithm
Published 2020“…Then, partially homomorphic encryption (PHE) technique - Rivest-Shamir-Adleman (RSA) algorithm was used to encrypt the ECG signal by using the public key. …”
Get full text
Get full text
Get full text
Article -
7
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. …”
Article -
8
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
9
Crypto Embedded System for Electronic Document
Published 2006“…The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
Get full text
Get full text
Article -
10
-
11
-
12
A hybrid method for data communication using encrypted audio steganography
Published 2024journal::journal article -
13
A New Approach To The Solution Of Economic Dispatch Using Genetic Algorithm
Published 2016“…The main idea of this paper focuses on the application of genetic algorithm in order to identify the best solution to an economic dispatch problem by using a new approach depending on Bmn coefficients and arithmetic crossover of the genetic algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Loss reduction in distribution networks using new network reconfiguration algorithm
Published 1996Get full text
Article -
15
Fast Finite Difference Time Domain Algorithms for Solving Antenna Application Problem
Published 2008“…Results show that these new sequential and parallel algorithms run faster than the standard sequential and parallel FDTD algorithms. …”
Get full text
Get full text
Thesis -
16
Enhancement of Ant System Algorithm for Course Timetabling Problem
Published 2009“…Results of the experiments that were conducted using various data sets showed that the proposed algorithm produced better course schedule solution than the Greedy Algorithm, Genetic Algorithm, and other variants of Ant System Algorithm.…”
Get full text
Get full text
Get full text
Thesis -
17
Encryption method for SCADA security enhancement
Published 2014“…The proposed security solutions takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within distributed network protocol (DNP3) stack. …”
Get full text
Get full text
Get full text
Article -
18
Opposition-based Whale Optimization Algorithm
Published 2018“…In order to improve solution accuracy and reliability, this paper proposes a new algorithm based on WOA. …”
Get full text
Get full text
Get full text
Article -
19
A New Hybrid Gravitational Search- Black Hole Algorithm
Published 2016“…This paper studies the solution of optimization problems using a new hybrid population-based algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Seed disperser ant algorithm for optimization / Chang Wen Liang
Published 2018“…These binary variables are used to locally search for optimum solution. SDAA is developed using the concept of male ants performing nuptial flights to generate new superior colonies. …”
Get full text
Get full text
Get full text
Thesis
