Thread / Post | Tags | ||
Title: IMPLEMENTATION OF AES RSA ECC Page Link: IMPLEMENTATION OF AES RSA ECC - Posted By: mechanical engineering crazy Created at: Friday 28th of August 2009 05:10:39 AM | rsa france, explanation of rsa algoritham program, rsa implementation in ns2, rsa dsa, powered by fireboard underrough smsaphy ecc, aes using vlsi ppt, vhdl code for aes for spartan 3e, | ||
IMPLEMENTATION OF AES, RSA, ECC | |||
| |||
Title: Elliptical curve cryptography ECC Page Link: Elliptical curve cryptography ECC - Posted By: computer science crazy Created at: Tuesday 24th of February 2009 03:21:48 AM | roc curve segmentation matlab, cryptography alphabet, source code for point addition and multiply for ecc curve in java, ecc for online admision system algorithmcs, cryptography c, s curve, palladim cryptography, | ||
ECC is a public key encryption technique based on elliptic curve theory. ECC can be used to create faster, smaller and more efficient cryptographic keys. It generates keys through the properties of the elliptic curve equation rather than the traditional method of generation, as the product of very large prime numbers. This technology can be used in conjunction with most of the public key encryption methods such as RSA and Diffie-Hellman. ECC can yield a level of security with a 164-bit key compared with other systems that require a 1,024-bit ke ....etc | |||
| |||
Title: pdf on electrochemical coagulation ecc technology for treatment of hospital wastewater Page Link: pdf on electrochemical coagulation ecc technology for treatment of hospital wastewater - Posted By: Created at: Friday 12th of October 2012 01:03:19 PM | electrochemical coagulation ecc technology for treatment, distillery wastewater treatment ppt, i want definition of electrochemical coagulation, ppt wastewater treatment in dairy industry, electrochemical machining machines, electrocoagulation wastewater treatment ppt, pdf on electrochemical coagulation ecc technology for treatment of hospital wastewater, | ||
sounds nice project title.... | |||
Title: code in ns2 for bandwidth estimation for tcp in wireless Page Link: code in ns2 for bandwidth estimation for tcp in wireless - Posted By: Created at: Sunday 30th of September 2012 03:37:03 PM | simulated annealing ns2 code, define xgraph wireless in ns2, bsmr ns2 project, fuzzy code for ns2, ns4 aksu userlogin, ns2 sample, ns2 aks u, | ||
hi am new to ns2...i am ding ma PG project in TCP in wireless networks am trying to estimate available bandwidth by modifying backend files tcp.cc and tcp.h in ns2...can yo help me to modify it??? ....etc | |||
Title: ELECTROCHEMICAL COAGULATION ECC TECHNOLOGY FOR TREATMENT OF HOSPITAL WASTEWATER Page Link: ELECTROCHEMICAL COAGULATION ECC TECHNOLOGY FOR TREATMENT OF HOSPITAL WASTEWATER - Posted By: karthikaradhya Created at: Sunday 11th of September 2011 12:34:52 PM | treatment of wastewater, electrocoagulation wastewater treatment ppt, electrochemical machining simnar, distillery wastewater treatment ppt, tolerance achievable by electrochemical machining, phytoremediation wastewater treatment ppt, electrochemical machining pdf, | ||
hi.. 'm Karthik doin environmental engineering final year..... 'm student of Sri Jayachamarajendra College of Engineering,Mysore.i here by request for the report ofELECTROCHEMICAL COAGULATION (ECC) TECHNOLOGY FOR TREATMENT OF HOSPITAL WASTEWATER.... | |||
Title: sample ns2 codes for wormhole attack simulation Page Link: sample ns2 codes for wormhole attack simulation - Posted By: Created at: Friday 05th of October 2012 01:37:29 PM | thesis for wormhole attack in manet, wormhole attack matlab code, wormhole implementation, wormhole attack modes ppt, wormhole attack source code, ppt of detection and prevention of wormhole attack, wormhole attack detection in wireless adhoc sensor networks, | ||
sir can u please provide me with ns2 code for wormhole attack simulation?? i need for my seminar presentation .... my id is [email protected] ....etc | |||
Title: Elliptical curve cryptography ECC Page Link: Elliptical curve cryptography ECC - Posted By: computer science crazy Created at: Monday 22nd of September 2008 12:07:35 PM | isopreference curve wiki, fabrication of road curve find, srs document on elliptical curve cryptography, introduction to cryptography, imbricate cryptography, cryptography blowfish, powered by fireboard underrough smsaphy ecc, | ||
ECC is a public key encryption technique based on elliptic curve theory. ECC can be used to create faster, smaller and more efficient cryptographic keys. It generates keys through the properties of the elliptic curve equation rather than the traditional method of generation, as the product of very large prime numbers. This technology can be used in conjunction with most of the public key encryption methods such as RSA and Diffie-Hellman. | |||
Title: ns2 projects for wormhole attack detection with source code free download Page Link: ns2 projects for wormhole attack detection with source code free download - Posted By: Created at: Monday 10th of September 2012 06:20:46 PM | wormhole attack prevention free source code in ns2 code, wormhole simulator, antnet ns2 35, projects on faul detection, leach c source code ns2, mobile based projects free source code, smurf attack simulation in ns2, | ||
hello | |||
Title: Introduction to ns2 Page Link: Introduction to ns2 - Posted By: seminar addict Created at: Tuesday 31st of January 2012 04:00:07 PM | ns2 leach pdf, vannet ns2, bad students whoing ns2, aks ns2 atendencs, aran in ns2, anthocnet ns2 34, leach in ns2 35, | ||
Introduction to ns2 | |||
Title: Elliptical curve cryptography ECC Page Link: Elliptical curve cryptography ECC - Posted By: seminar projects crazy Created at: Saturday 13th of June 2009 09:33:28 PM | fabrication of road curve find, cryptography alice bob, cryptography alphabet, learning curve star, cryptologywhat is cryptography, frictionless banked curve, ecc forouzan ppt, | ||
This innovative technology can produce smaller, faster and efficient cryptographic keys using the break through technique of elliptic curve equation rather than employing the traditional method of producing the key as the product of very large prime numbers. Although ECC can be used in collaboration with other public key encryption methods like the RSA, and Diffie-Hellman, it gains upper hand over the other encryption methods in the level of security it offers. A 164-bit ECC key can provide with an equivalent amount of security that a 1024-bit ....etc | |||
Please report us any abuse/complaint to "omegawebs @ gmail.com" |