Search Results - (( solution using ((rsa algorithm) OR (new algorithm)) ) OR ( java implication _ algorithm ))

Refine Results
  1. 1

    Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security by H. Belgassem, Seddeq

    Published 2004
    “…Performance has always been the most critical characteristic of a cryptographic algorithm, which determines its effectiveness. In this research the most popular and used algorithm, which is RSA, is implemented with a new modification in order to reduce the calculation time of the algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    An improved public key cryptography based on the elliptic curve by Al-Daoud, Essam Faleh

    Published 2002
    “…A new algorithm to compress and decompress the sparse elements algorithms are introduced to reduce the size of the transited parameters. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Performance analysis and improvement of rabin primitive based cryptosystems by Mahad, Zahari

    Published 2014
    “…While in the decryption process, it involves the mathematical solution method using Chinese Remainder Theorem that produces four different answers where only one correct answer need to be determined by user. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Secured electrocardiograph (ECG) signal using partially homomorphic encryption technique–RSA algorithm by Shaikh, Muhammad Umair, Wan Adnan, Wan Azizun, Ahmad, Siti Anom

    Published 2020
    “…Then, partially homomorphic encryption (PHE) technique - Rivest-Shamir-Adleman (RSA) algorithm was used to encrypt the ECG signal by using the public key. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen by Shawkat S.A., Tuama B.A., Al-Barazanchi I.

    Published 2023
    “…The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. …”
    Article
  8. 8
  9. 9

    Crypto Embedded System for Electronic Document by Ahmad, Illiasaak, M.Thamrin, Norashikin, Hani, Mohamed Khalil

    Published 2006
    “…The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12
  13. 13

    A New Approach To The Solution Of Economic Dispatch Using Genetic Algorithm by Al-Shetwi, Ali Q., Alomoush, Muwaffaq I.

    Published 2016
    “…The main idea of this paper focuses on the application of genetic algorithm in order to identify the best solution to an economic dispatch problem by using a new approach depending on Bmn coefficients and arithmetic crossover of the genetic algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Fast Finite Difference Time Domain Algorithms for Solving Antenna Application Problem by Hasan, Mohammad Khatim

    Published 2008
    “…Results show that these new sequential and parallel algorithms run faster than the standard sequential and parallel FDTD algorithms. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Enhancement of Ant System Algorithm for Course Timetabling Problem by Djamarus, Djasli

    Published 2009
    “…Results of the experiments that were conducted using various data sets showed that the proposed algorithm produced better course schedule solution than the Greedy Algorithm, Genetic Algorithm, and other variants of Ant System Algorithm.…”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Encryption method for SCADA security enhancement by Shahzad, Aamir, Musa, Shahrulniza, Irfan, Muhammad, Shah, Asadullah

    Published 2014
    “…The proposed security solutions takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within distributed network protocol (DNP3) stack. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Opposition-based Whale Optimization Algorithm by Alamri, Hammoudeh S., Alsariera, Yazan A., Kamal Z., Zamli

    Published 2018
    “…In order to improve solution accuracy and reliability, this paper proposes a new algorithm based on WOA. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A New Hybrid Gravitational Search- Black Hole Algorithm by Suad Khairi, Mohammed, Zuwairie, Ibrahim, Hamdan, Daniyal, Nor Azlina, Ab. Aziz

    Published 2016
    “…This paper studies the solution of optimization problems using a new hybrid population-based algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Seed disperser ant algorithm for optimization / Chang Wen Liang by Chang , Wen Liang

    Published 2018
    “…These binary variables are used to locally search for optimum solution. SDAA is developed using the concept of male ants performing nuptial flights to generate new superior colonies. …”
    Get full text
    Get full text
    Get full text
    Thesis