Search Results - (( technology implementation rsa algorithm ) OR ( java adaptation optimization algorithm ))
Search alternatives:
- adaptation optimization »
- implementation rsa »
- java adaptation »
- rsa algorithm »
-
1
-
2
-
3
-
4
Comparison of ECC and RSA algorithms in IOT devices
Published 2019Get full text
Get full text
Article -
5
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
6
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010Get full text
Get full text
Proceeding Paper -
7
AAβ public key cryptosystem - a comparative analysis against RSA and ECC
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Encryption Technology on Windows Workstation
Published 2004“…The result of this study will be an enhanced version of current encryption technology that is ready to be implemented or applied by interested parties.…”
Get full text
Get full text
Final Year Project -
9
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
10
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
11
-
12
-
13
Two-stage feature selection using ranking self-adaptive differential evolution algorithm for recognition of acceleration activity
Published 2018“…The fast development of sensing technology has become a fundamental platform for researchers to implement a system that could fulfill human needs. …”
Get full text
Get full text
Get full text
Article -
14
-
15
A study of watermarking methods in medical application
Published 2004“…Among these three methods, LSB method has the most capacity of watermark and fastest rate in embedding process. These three algorithms implemented in this project are shown to be sensitive for the attack. …”
Get full text
Get full text
Thesis -
16
A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata
Published 2019“…Secret Sharing technique is used to generate Fake Asymmetric Keys by using LaGrange Polynomial Interpolation formula and RSA algorithm. Secured communication is achieved where the notion of plausible deniability is successfully implemented by fusing the processes of theorem's verification and data's validation in the protocol construction methodology.…”
Get full text
Get full text
Thesis -
17
Partial encryption of compressed images employing FPGA
Published 2005Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
19
Simulation of quantum growing network / Ong Boon Teong
Published 2003“…Should it be possible to build a microprocessor which fully exploits quantum mechanics then it may be possible to carry out such factorisations in remarkably less time. The RSA algorithm, a widely used encryption system, is safe only if such factorisations cannot be performed quickly. …”
Get full text
Get full text
Thesis -
20
Data classification based on confidentiality in virtual cloud environment
Published 2014Get full text
Get full text
Article
