Search Results - (( solution using rsa algorithm ) OR ( ((java implication) OR (_ implication)) force algorithm ))
Search alternatives:
- java implication »
- force algorithm »
- solution using »
- rsa algorithm »
- _ implication »
- using rsa »
-
1
Secured electrocardiograph (ECG) signal using partially homomorphic encryption technique–RSA algorithm
Published 2020“…Then, partially homomorphic encryption (PHE) technique - Rivest-Shamir-Adleman (RSA) algorithm was used to encrypt the ECG signal by using the public key. …”
Get full text
Get full text
Get full text
Article -
2
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…Performance has always been the most critical characteristic of a cryptographic algorithm, which determines its effectiveness. In this research the most popular and used algorithm, which is RSA, is implemented with a new modification in order to reduce the calculation time of the algorithm. …”
Get full text
Get full text
Thesis -
3
-
4
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. …”
Article -
5
Crypto Embedded System for Electronic Document
Published 2006“…The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
Get full text
Get full text
Article -
6
-
7
-
8
A hybrid method for data communication using encrypted audio steganography
Published 2024journal::journal article -
9
Performance analysis and improvement of rabin primitive based cryptosystems
Published 2014“…While in the decryption process, it involves the mathematical solution method using Chinese Remainder Theorem that produces four different answers where only one correct answer need to be determined by user. …”
Get full text
Get full text
Get full text
Thesis -
10
An improved public key cryptography based on the elliptic curve
Published 2002“…Moreover, the new formula can be used more efficiently when it is combined with the suggested sparse elements algorithms. …”
Get full text
Get full text
Thesis -
11
-
12
Encryption method for SCADA security enhancement
Published 2014“…The proposed security solutions takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within distributed network protocol (DNP3) stack. …”
Get full text
Get full text
Get full text
Article -
13
Quaternion-based dynamic algorithm for random generation of solid 4D cylindrical curves in RVE modeling
Published 2025“…Random Sequential Adsorption (RSA) is integrated with quaternion mathematics to achieve dense, yet random, fiber packing. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon
Published 2017“…Text digital watermarking,which is an important research direction for information hiding, can be used for copyright protection of text documents. …”
Get full text
Get full text
Get full text
Thesis -
16
A new inexact line search method for convex optimization problems
Published 2013“…In general one can say that line search procedure for the steplength and search direction are two important elements of a line search algorithm. The line search procedure requires much attention because of its far implications on the robustness and efficiency of the algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
17
Aligning Malaysian SMEs with the megatrends: the roles of HPWPs and employee creativity in enhancing Malaysian SME performance
Published 2018“…The partial least squares algorithm and the bootstrapping technique were used for data analysis. …”
Get full text
Get full text
Article -
18
Analyzing surface settlement factors in single and twin tunnels : A review study
Published 2024“…Leveraging historical data and ML algorithms can enhance SS prediction accuracy and aid in proactive risk management. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
The relationships between brand attributes and word of mouth on brand identity and brand image
Published 2017“…Finally, the study's implications for theory and practice, limitations, conclusions as well as directions for future research are provided and discussed.…”
Get full text
Get full text
Get full text
Thesis
