Search Results - (( user computing rsa algorithm ) OR ( using optimization modified algorithm ))
Search alternatives:
- optimization modified »
- user computing »
- computing rsa »
- rsa algorithm »
-
1
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
2
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
3
-
4
A RSA-type cryptosystem based on quartic polynomials
Published 2011“…Common users of RSA cryptosystem are currently using 1024-bit keys. …”
Get full text
Get full text
Thesis -
5
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…ECC, AES, and RSA algorithms will be used to encrypt the files to enhance security data on the cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
6
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. …”
Article -
7
Improve cloud computing security using RSA encryption with Fermat's little theorem
Published 2014“…Hence we provide a new method for Cloud Computing Security by applying RSA algorithm and Fermat's theorem together. …”
Get full text
Get full text
Get full text
Article -
8
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Thus, it is suitable for mobile devices, it uses 160 bits key and provides the same security as RSA 1024 bits key.Some benefits are expected from this study to improve the encryption algorithm for mobile security.…”
Get full text
Get full text
Conference or Workshop Item -
9
RSA authentication mechanisms in control grid computing environment using Gridsim toolkit
Published 2015“…In order to satisfy the security need of grid computing environment, we design an alternative authentication mechanism using RSA algorithm to ensure the user identification, and carry out the experiment in the Gridsim toolkit simulator.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
-
11
Digital Certificate-based Authentication Model For Enhanced Smartphone Security
Published 2025journal::journal article -
12
Optimization of modified Bouc–Wen model for magnetorheological damper using modified cuckoo search algorithm
Published 2021“…A comparison was done against particle swarm optimization, genetic algorithm, and sine–cosine algorithm, where the modified cuckoo search algorithm showed the lowest root mean square error and fastest convergence rate among the three algorithms.…”
Get full text
Get full text
Get full text
Article -
13
A novel quasi-oppositional modified Jaya algorithm for multi-objective optimal power flow solution
Published 2018“…The proposed algorithm is scrutinized and validated using the modified IEEE 30-bus test system. …”
Get full text
Get full text
Get full text
Article -
14
Wind farm layout design using modified particle swarm optimization algorithm
Published 2015Get full text
Get full text
Conference or Workshop Item -
15
Modified multi verse optimizer for solving optimization problems using benchmark functions
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Optimized clustering with modified K-means algorithm
Published 2021“…Clustering technique is able to find hidden patterns and to extract useful information from huge data. Among the techniques, the k-means algorithm is the most commonly used technique for determining optimal number of clusters (k). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Implementation of High Speed Large Integer Multiplication Algorithm on Contemporary Architecture
Published 2018“…The computation of cryptographic algorithm required a lot of large integer arithmetic computation, especially large integer exponentiation and modular operation. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
-
19
Optimal power flow based on fuzzy linear programming and modified Jaya algorithms
Published 2017“…A set of modified and novel optimization algorithms are proposed in this thesis to deal with different single and multi-objective OPF problems. …”
Get full text
Get full text
Thesis -
20
