A New Approach To Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
Kajian ini mencadangkan primitif baru kekunci-awam berasaskan kepada set Fraktal Mandelbrot dan Julia. Penciptaan kekunci-awam primitif berasas Fraktal boleh dilakukan kerana perkaitan yang kuat di antara set Fraktal Mandelbrot dan set Fraktal Julia. This study proposes new public-key primitives...
| Main Author: | A. Alia, Mohammad Ahmad |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2008
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/8981/ |
| Abstract | Abstract here |
Similar Items
A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations
by: Jaafar, Abdullah Mohammed Abdo Ali
Published: (2011)
by: Jaafar, Abdullah Mohammed Abdo Ali
Published: (2011)
Zot-Binary: A New Number System And Its Application On Number Theory Based Public-Key Cryptography
by: Jahani, Shahram
Published: (2016)
by: Jahani, Shahram
Published: (2016)
Self-Verification Of Public-Key
Agreement Over Voip Using Random
Fusion Scheme
by: Alfin Syafalni, Alfin Syafalni
Published: (2016)
by: Alfin Syafalni, Alfin Syafalni
Published: (2016)
Two Novel E-Visas Verification Schemes Based On
Public Key Infrastructure (Pki) And Identity Based
Encryption (Ibe).
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
by: Abuadhmah, Najlaa Abdullah
Published: (2010)
Division-Based Methods For Large Point Sets Registration
by: Chen , Junfen
Published: (2016)
by: Chen , Junfen
Published: (2016)
Dynamic Technique for Optimizing Universal Mobile Telecommunication System Active Set.
by: Mutlag, Samer Abdulsada
Published: (2010)
by: Mutlag, Samer Abdulsada
Published: (2010)
Segmentation Of Ultisequence Medical Images Using Random Walks Algorithm And Rough Sets Theory
by: Lim, Khai Yin
Published: (2017)
by: Lim, Khai Yin
Published: (2017)
Parallel Platform For New Secure Stream Ciphers Based On Np-hard Problems
by: Mohammad A. Suwais, Khaled
Published: (2009)
by: Mohammad A. Suwais, Khaled
Published: (2009)
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
by: Keshkeh, Kinan
Published: (2022)
by: Keshkeh, Kinan
Published: (2022)
Hippocampus Segmentation Using Locally Integrated Prior-Based Level Set Guided By Assembled And Weighted
Coherent Point Drift Registration
by: Achuthan, Anusha
Published: (2016)
by: Achuthan, Anusha
Published: (2016)
Zot-mk: A New Algorithm For Big Integer Multiplication
by: Jahani , Shahram
Published: (2009)
by: Jahani , Shahram
Published: (2009)
New Representation Method For Integers And Its Application On Elliptic Curve Cryptography
by: Eghdamian, Arash
Published: (2020)
by: Eghdamian, Arash
Published: (2020)
ZOT-MK: a new algorithm for big integer multiplication[QA75].
by: Jahani, Shahram
Published: (2009)
by: Jahani, Shahram
Published: (2009)
Acltshe-Amts: A New Adaptive Brain Tumour Enhancement And Segmentation Approaches
by: Alkhafaji, Ali Fawzi Mohammed Ali
Published: (2024)
by: Alkhafaji, Ali Fawzi Mohammed Ali
Published: (2024)
A new approach based on honeybee guarding system to improve intrusion detection system.
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
A New Approach Based On Honeybee Guarding
System To Improve Intrusion Detection System
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
New Fuzzy Parametric Linear Programming Approaches For Optimising The Performance Of Crude Oil Companies In Iraq
by: Jasim, Al Saeedi Rafid Abdulmahdi
Published: (2023)
by: Jasim, Al Saeedi Rafid Abdulmahdi
Published: (2023)
Harmony search-based fuzzy clustering algorithms for image segmentation.
by: Alia, Osama Moh’d Radi
Published: (2011)
by: Alia, Osama Moh’d Radi
Published: (2011)
Adapting and enhancing mussels wandering optimization algorithm for supervised training of neural networks
by: Abusnaina, Ahmed A. A.
Published: (2015)
by: Abusnaina, Ahmed A. A.
Published: (2015)
Adaptive Pca-Based Models To
Reconstruct 3d Faces From Single 2d
Images
by: Maghari, Ashraf Y. A.
Published: (2014)
by: Maghari, Ashraf Y. A.
Published: (2014)
Adaptive and cooperative harmony search models for RNA secondary structure prediction
by: Mohsen, Abdulqader Mohammed A.
Published: (2011)
by: Mohsen, Abdulqader Mohammed A.
Published: (2011)
Adaptive And Cooperative Harmony
Search Models For Rna Secondary
Structure Prediction
by: A. Mohsen, Abdulqader Mohammed
Published: (2011)
by: A. Mohsen, Abdulqader Mohammed
Published: (2011)
A Framework For Automatic Code Switching Speech Recognition With Multilingual Acoustic And Pronunciation Models Adaptation
by: Ahmed, Basem H. A.
Published: (2014)
by: Ahmed, Basem H. A.
Published: (2014)
Similarity Segmentation Approach For Sensor-Based Human Activity Recognition
by: Baraka, Abdulrahman M. A.
Published: (2024)
by: Baraka, Abdulrahman M. A.
Published: (2024)
Adaptive And Cooperative Harmony
Search Models For Rna Secondary
Structure Prediction
by: A. Mohsen, Abdul Qader Mohammed
Published: (2011)
by: A. Mohsen, Abdul Qader Mohammed
Published: (2011)
Ipv6 Migration Framework For Government Agencies In
Malaysia
by: Mohinder Singh, A Winder Kaur
Published: (2009)
by: Mohinder Singh, A Winder Kaur
Published: (2009)
Landmark Image Discovery Using Network Clustering"
by: Mohammed Al-Zou’Bi, Ala’A Ahmed
Published: (2022)
by: Mohammed Al-Zou’Bi, Ala’A Ahmed
Published: (2022)
Quality Of Service Enabled Cross-Layer Multicast Framework For Mobile Ad Hoc Networks.
by: Mohammed Saghir, Mohammed
Published: (2008)
by: Mohammed Saghir, Mohammed
Published: (2008)
A Grid Meta-Scheduler Using Community Scheduler
Framework (Csf) With Different Plug-In Policies
Performance Evaluation
by: Tan , Zhen Ling
Published: (2008)
by: Tan , Zhen Ling
Published: (2008)
Efficient Queue And Gsi Security
Management Framework For Mobile
Desktop Grid
by: Sarwar, Muhammad Imran
Published: (2008)
by: Sarwar, Muhammad Imran
Published: (2008)
Initial File-Placement In Data Grid Environment Using Game Theory And Fictitious Play
by: Indrayanto, Aloysius
Published: (2008)
by: Indrayanto, Aloysius
Published: (2008)
Static Hand Gesture Recognition Using Haar-Like Features
by: Wong, Kai Sin
Published: (2015)
by: Wong, Kai Sin
Published: (2015)
Optimized feature construction methods for data summarizations of relational data
by: Sze, Florence Sia Fui
Published: (2014)
by: Sze, Florence Sia Fui
Published: (2014)
A Statistical Approach Towards Worm Detection Using Cross-Relation Technique
by: Anbar, Mohammed F.R.
Published: (2013)
by: Anbar, Mohammed F.R.
Published: (2013)
Internet Telephony Transport Protocol (ITTP): An Efficient Transport Protocol For Voip Applications
by: Abu-Alhaj, Mosleh Mohammad
Published: (2011)
by: Abu-Alhaj, Mosleh Mohammad
Published: (2011)
Xcast Based Routing Protocol For Push To Talk Application In Mobile Ad Hoc Networks
by: Alzyoud, Faisal Yousef Abed-alrahman
Published: (2011)
by: Alzyoud, Faisal Yousef Abed-alrahman
Published: (2011)
Adapting And Enhancing Hybrid Computational Methods For RNA
Secondary Structure Prediction
by: Al-Khatib, Ra’ed Mohammad Ali
Published: (2011)
by: Al-Khatib, Ra’ed Mohammad Ali
Published: (2011)
Personalizable Models For Business-To-Business Information Interchange In Communication Layers
by: Ting, Tin Tin
Published: (2011)
by: Ting, Tin Tin
Published: (2011)
A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
Visualizing Phylogenetic Trees: Algorithms And Visual Comparison Techniques
by: Wan Zainon, Wan Mohd Nazmee
Published: (2011)
by: Wan Zainon, Wan Mohd Nazmee
Published: (2011)
Similar Items
-
A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations
by: Jaafar, Abdullah Mohammed Abdo Ali
Published: (2011) -
Zot-Binary: A New Number System And Its Application On Number Theory Based Public-Key Cryptography
by: Jahani, Shahram
Published: (2016) -
Self-Verification Of Public-Key
Agreement Over Voip Using Random
Fusion Scheme
by: Alfin Syafalni, Alfin Syafalni
Published: (2016) -
Two Novel E-Visas Verification Schemes Based On
Public Key Infrastructure (Pki) And Identity Based
Encryption (Ibe).
by: Abuadhmah, Najlaa Abdullah
Published: (2010) -
Division-Based Methods For Large Point Sets Registration
by: Chen , Junfen
Published: (2016)
