Search Results - (( through implementation rsa algorithm ) OR ( java application optimisation algorithm ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    Comparison between RSA hardware and software implementation for WSNs sexcurity schemes by Md. Tap, Abu Osman, Manttoro, Teddy, Alkalbani, Abdullah Said

    Published 2010
    “…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. Our simulation shows that usage of hardware security could improve time efficiency and decrease the power consumption, so the strong cryptography can be implemented in WSNs security.…”
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    A parallel version of a binary method and vector addition chains precomputation for exponentiation in RSA / Siti Khatijah Nor Abdul Rahim and Siti Rozanae Ismail by Abdul Rahim, Siti Khatijah Nor, Ismail, Siti Rozanae

    Published 2006
    “…Encryption and decryption in RSA is achieved through exponentiation. There are various approaches to achieve exponentiation. …”
    Get full text
    Get full text
    Research Reports
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection by Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…The performance proposed encryption algorithm was promising which could be a starting point for detailed analysis and implementation in real application domains.…”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Enhancement of {0, 1, 3}-NAF Recoding Algorithm using Block Method Technique for Elliptic Curve Cryptosystem by Bafandehkar, Mohsen

    Published 2015
    “…The objective of this research is to introduce an efficient implementation of {0,1, 3}-NAF scalar recoding algorithm by implementing block method. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  8. 8

    Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon by Lew , Chee Hon

    Published 2017
    “…Related work was surveyed in digital watermarking, cryptography and design methodology before implementing the text based watermarking method (embedded and extract/detection of watermarks).The implementation results on text based digital watermarking combined with cryptographic techniques are presented. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Digital certificate-based authentication model for enhanced smartphone security / A. H. Azni, Sakiinah Altaf Hussain and Najwa Hayaati Mohd Alwi by Azni, A. H., Altaf Hussain, Sakiinah, Mohd Alwi, Najwa Hayaati

    Published 2025
    “…This paper introduces an innovative authentication model for smartphones, integrating digital certificates and secret keys to securely encrypt and decrypt data. The model employs the RSA algorithm to generate encryption keys and authenticate user and device identities. …”
    Get full text
    Get full text
    Get full text
    Article