A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations
Many public-key cryptosystems are used in our daily lives to attain privacy, authenticity, integrity and non-repudiation. However, most of the existing public-key algorithms are based on complex mathematical computations. Until recently, building a highly secured public-key cryptosystem without util...
| Main Author: | Jaafar, Abdullah Mohammed Abdo Ali |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2011
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/41333/ |
| Abstract | Abstract here |
Similar Items
A New Approach To Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
by: A. Alia, Mohammad Ahmad
Published: (2008)
by: A. Alia, Mohammad Ahmad
Published: (2008)
Zot-Binary: A New Number System And Its Application On Number Theory Based Public-Key Cryptography
by: Jahani, Shahram
Published: (2016)
by: Jahani, Shahram
Published: (2016)
Self-Verification Of Public-Key
Agreement Over Voip Using Random
Fusion Scheme
by: Alfin Syafalni, Alfin Syafalni
Published: (2016)
by: Alfin Syafalni, Alfin Syafalni
Published: (2016)
Two Novel E-Visas Verification Schemes Based On
Public Key Infrastructure (Pki) And Identity Based
Encryption (Ibe).
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
Document And Query Expansion Method
With Dirichlet Smoothing Model For
Retrieval Of Metadata Content In Digital
Resource Objects
by: Alma’aitah, Wafa’ Za’al Mohammad
Published: (2020)
by: Alma’aitah, Wafa’ Za’al Mohammad
Published: (2020)
Document And Query Expansion Method With Dirichlet Smoothing Model For Retrieval Of Metadata Content In Digital
Resource Objects
by: Alma’aitah, Wafa’ Za’al Mohammad
Published: (2020)
by: Alma’aitah, Wafa’ Za’al Mohammad
Published: (2020)
Visualizing Phylogenetic Trees: Algorithms And Visual Comparison Techniques
by: Wan Zainon, Wan Mohd Nazmee
Published: (2011)
by: Wan Zainon, Wan Mohd Nazmee
Published: (2011)
Multipath Cluster Based Routing Protocol For Non-Uniform Node Density Mobile Ad Hoc Networks
by: Mohammed Mahdi, Mohammed Abdo
Published: (2016)
by: Mohammed Mahdi, Mohammed Abdo
Published: (2016)
A Visual Approach For Requirement Traceability
by: Madaki, Abdulkadir Ahmad
Published: (2022)
by: Madaki, Abdulkadir Ahmad
Published: (2022)
Genogram Visualization Using Social Network Approach For Medical Family Tree
by: Bokhare, Siti Fatimah
Published: (2018)
by: Bokhare, Siti Fatimah
Published: (2018)
Soccer Video Event Detection Via Collaborative Textual, Aural And Visual Analysis
by: Halin, Alfian Abdul
Published: (2011)
by: Halin, Alfian Abdul
Published: (2011)
Zot-mk: A New Algorithm For Big Integer Multiplication
by: Jahani , Shahram
Published: (2009)
by: Jahani , Shahram
Published: (2009)
E-Shopping With Drive-Through (Eway):
Effective Drive-Through Operation For Eway
by: Guan, Huoi Ying
Published: (2010)
by: Guan, Huoi Ying
Published: (2010)
New Representation Method For Integers And Its Application On Elliptic Curve Cryptography
by: Eghdamian, Arash
Published: (2020)
by: Eghdamian, Arash
Published: (2020)
A Real Time Visual Monitoring Module For Traffic Conditions Based On A Modified Auto-Associative Memory
by: Kareem, Emad Issa Abdul
Published: (2012)
by: Kareem, Emad Issa Abdul
Published: (2012)
Enhancing Control Flow Comprehension Using Zoom Visual Flow (ZViF) Technique To Represent Control Structures
by: Kadar, Rozita
Published: (2011)
by: Kadar, Rozita
Published: (2011)
Parallel Platform For New Secure Stream Ciphers Based On Np-hard Problems
by: Mohammad A. Suwais, Khaled
Published: (2009)
by: Mohammad A. Suwais, Khaled
Published: (2009)
ZOT-MK: a new algorithm for big integer multiplication[QA75].
by: Jahani, Shahram
Published: (2009)
by: Jahani, Shahram
Published: (2009)
Acltshe-Amts: A New Adaptive Brain Tumour Enhancement And Segmentation Approaches
by: Alkhafaji, Ali Fawzi Mohammed Ali
Published: (2024)
by: Alkhafaji, Ali Fawzi Mohammed Ali
Published: (2024)
Passive operating system fingerprinting based on multi-layered sub-signature matching scheme (MLSMS).
by: Aljammal, Ashraf Hamdan Rashid
Published: (2011)
by: Aljammal, Ashraf Hamdan Rashid
Published: (2011)
Distributed Preemptive Process
Management With Checkpointing And
Migration For A Linux-Based Grid
Operating System
by: Htin, Paw Oo @ Nur Hussein
Published: (2006)
by: Htin, Paw Oo @ Nur Hussein
Published: (2006)
A new approach based on honeybee guarding system to improve intrusion detection system.
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
A New Approach Based On Honeybee Guarding
System To Improve Intrusion Detection System
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
New Fuzzy Parametric Linear Programming Approaches For Optimising The Performance Of Crude Oil Companies In Iraq
by: Jasim, Al Saeedi Rafid Abdulmahdi
Published: (2023)
by: Jasim, Al Saeedi Rafid Abdulmahdi
Published: (2023)
G-Group E-Shopping With Drive-Through (eWay) : Effective Drive-Through Operation For eWay
by: Guan, Huoi Ying
Published: (2010)
by: Guan, Huoi Ying
Published: (2010)
Ad Hoc Wireless Routing With Density Based Probabilistic Algorithm For Mobile Wireless Networks With Non-Uniform Node Distribution
by: Ong , Hean Loong
Published: (2010)
by: Ong , Hean Loong
Published: (2010)
Enhancing Security Protocol For Voip Communication Using Modified Vector Quantization
by: Jaafar, Mohd Yazid Mohd
Published: (2013)
by: Jaafar, Mohd Yazid Mohd
Published: (2013)
Static Hand Gesture Recognition Using Haar-Like Features
by: Wong, Kai Sin
Published: (2015)
by: Wong, Kai Sin
Published: (2015)
Optimized feature construction methods for data summarizations of relational data
by: Sze, Florence Sia Fui
Published: (2014)
by: Sze, Florence Sia Fui
Published: (2014)
A Statistical Approach Towards Worm Detection Using Cross-Relation Technique
by: Anbar, Mohammed F.R.
Published: (2013)
by: Anbar, Mohammed F.R.
Published: (2013)
Internet Telephony Transport Protocol (ITTP): An Efficient Transport Protocol For Voip Applications
by: Abu-Alhaj, Mosleh Mohammad
Published: (2011)
by: Abu-Alhaj, Mosleh Mohammad
Published: (2011)
Xcast Based Routing Protocol For Push To Talk Application In Mobile Ad Hoc Networks
by: Alzyoud, Faisal Yousef Abed-alrahman
Published: (2011)
by: Alzyoud, Faisal Yousef Abed-alrahman
Published: (2011)
Adapting And Enhancing Hybrid Computational Methods For RNA
Secondary Structure Prediction
by: Al-Khatib, Ra’ed Mohammad Ali
Published: (2011)
by: Al-Khatib, Ra’ed Mohammad Ali
Published: (2011)
Personalizable Models For Business-To-Business Information Interchange In Communication Layers
by: Ting, Tin Tin
Published: (2011)
by: Ting, Tin Tin
Published: (2011)
A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
Heuristic-Based Ant Colony Optimization Algorithm For Protein Functional Module Detection In Protein Interaction Network
by: SALLIM, JAMALUDIN
Published: (2017)
by: SALLIM, JAMALUDIN
Published: (2017)
An optimized framework for header suppression of real time IPV6 traffic in multiprotocol label switching (MPLS) networks.
by: Mohammed, Imad Jasim
Published: (2011)
by: Mohammed, Imad Jasim
Published: (2011)
Harmony search-based fuzzy clustering algorithms for image segmentation.
by: Alia, Osama Moh’d Radi
Published: (2011)
by: Alia, Osama Moh’d Radi
Published: (2011)
Keyword Competition Approach In
Ranked Document Retrieval
by: Sihombing, Poltak
Published: (2010)
by: Sihombing, Poltak
Published: (2010)
Harmony search algorithms for ab initio protein tertiary structure prediction.
by: Rub, Mohammed Said Saleh Abual
Published: (2011)
by: Rub, Mohammed Said Saleh Abual
Published: (2011)
Similar Items
-
A New Approach To Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
by: A. Alia, Mohammad Ahmad
Published: (2008) -
Zot-Binary: A New Number System And Its Application On Number Theory Based Public-Key Cryptography
by: Jahani, Shahram
Published: (2016) -
Self-Verification Of Public-Key
Agreement Over Voip Using Random
Fusion Scheme
by: Alfin Syafalni, Alfin Syafalni
Published: (2016) -
Two Novel E-Visas Verification Schemes Based On
Public Key Infrastructure (Pki) And Identity Based
Encryption (Ibe).
by: Abuadhmah, Najlaa Abdullah
Published: (2010) -
Document And Query Expansion Method
With Dirichlet Smoothing Model For
Retrieval Of Metadata Content In Digital
Resource Objects
by: Alma’aitah, Wafa’ Za’al Mohammad
Published: (2020)
