Search Results - (( using optimization method algorithm ) OR ( user computing rsa algorithm ))*
Search alternatives:
- method algorithm »
- user computing »
- computing rsa »
- rsa algorithm »
-
1
Implementation of High Speed Large Integer Multiplication Algorithm on Contemporary Architecture
Published 2018“…Both radix-2 and radix-4 FNT modules are implemented and a further design of radix-4 FNT module, named radix-4 CTFNT module that is optimized to fit the multiplication algorithm we used is proposed. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
3
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
4
-
5
A RSA-type cryptosystem based on quartic polynomials
Published 2011“…Common users of RSA cryptosystem are currently using 1024-bit keys. …”
Get full text
Get full text
Thesis -
6
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…ECC, AES, and RSA algorithms will be used to encrypt the files to enhance security data on the cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
7
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. …”
Article -
8
Improve cloud computing security using RSA encryption with Fermat's little theorem
Published 2014“…Hence we provide a new method for Cloud Computing Security by applying RSA algorithm and Fermat's theorem together. …”
Get full text
Get full text
Get full text
Article -
9
New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study
Published 2012“…Thus, it is suitable for mobile devices, it uses 160 bits key and provides the same security as RSA 1024 bits key.Some benefits are expected from this study to improve the encryption algorithm for mobile security.…”
Get full text
Get full text
Conference or Workshop Item -
10
RSA authentication mechanisms in control grid computing environment using Gridsim toolkit
Published 2015“…In order to satisfy the security need of grid computing environment, we design an alternative authentication mechanism using RSA algorithm to ensure the user identification, and carry out the experiment in the Gridsim toolkit simulator.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
Digital Certificate-based Authentication Model For Enhanced Smartphone Security
Published 2025journal::journal article -
13
-
14
-
15
-
16
Application of genetic algorithm methods to optimize flowshop sequencing problem
Published 2008“…Genetic algorithm method was one of the methods that were widely used in solving optimization problem. …”
Get full text
Get full text
Undergraduates Project Papers -
17
Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan
Published 2018“…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
Get full text
Get full text
Thesis -
18
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
Get full text
Get full text
Thesis -
19
Wind farm reactive power optimization by using imperialist competitive algorithm
Published 2013“…In this paper a new evolutionary computing method based on imperialist competitive algorithm (ICA) is used for optimization of the reactive power in a wind farm. …”
Get full text
Get full text
Conference or Workshop Item -
20
SA-EVPS ALGORITHM FOR DISCRETE SIZE OPTIMIZATION OF THE 582-BAR SPATIAL TRUSS STRUCTURE
Published 2023“…Nowadays, approximate optimization methods are widely used. This study utilized the Self Adaptive Enhanced Vibrating Particle System (SA-EVPS) algorithm as an approximate optimization method, since the EVPS algorithm requires experimental parameters. …”
Get full text
Get full text
Article
