Figure 2 - uploaded by Qasem Abu Al-Haija
Content may be subject to copyright.
Source publication
RSA Crypto-Algorithm is well-known and widely used public key cryptographic algorithm due to the prominent level of proven security which depends on the difficulty of large integer factorization problem. RSA is heavily based on the modular arithmetic of large integers and the whole RSA includes three parts: key generation, encryption and decryption...
Similar publications
We present an algorithm for constructing (k,2)-arcs in Hall Plane and apply the
algorithm (implemented in C#) to determine and classify them.
O transporte é tido, na atualidade, como um influente fator de desenvolvimento regional, capaz de viabilizar diversas atividades socioeconômicas e atuar como agente da inclusão social. Diante disto, este artigo tem como objetivo principal propor a utilização de bases de dados do Google para aplicações e estudos diversos na área de transportes. A me...
RESUMEN El presente artículo describe el resultado de la convergencia de tres importantes escenarios en la generación de conocimiento: la utilización de tecnología, la investigación y la vinculación con la comunidad. En el ámbito tecnológico se generó un software en lenguaje C#, que mediante una Interfaz Natural de usuario NUI reconoce coordenadas...
This study presents the design and completion of attendance system by using GSM system and C-sharp language. A new advance technology in programmable attendance organization system comprehensive by means of computer programs has implemented. The proposal use the real time face detection included managements system with automatically detected regist...
RESUMEN El presente artículo describe el resultado de la convergencia de tres importantes escenarios en la generación de conocimiento: la utilización de tecnología, la investigación y la vinculación con la comunidad. En el ámbito tecnológico se generó un software en lenguaje C#, que mediante una Interfaz Natural de usuario NUI reconoce coordenadas...
Citations
... In recent years, advanced synthesis and design have been achieved in the development of new telecommunication and data sharing technologies such as mobile-based applications, cloud computing, and Internet of things (IoT) [6]. This, in turn, has raised the demand to develop secure communication over insecure channels for different applications. ...
... Many types of research have been conducted to ensure data security for many shapes of shared data. For example, the software-based Rivest-Shamir-Adleman (RSA) cryptosystem which is used to encrypt and decrypt text messages prior communicating them by sender and receiver [6]. On the other hand, there is a need for portable email version along with the one offered by KFU official website which enables the user to access the KFU email by the web-based links. ...
Nowadays, the development of innovative technology has emerged, particularly in mobile phones. People are often using smartphones daily in almost every aspect of their lives to use different applications and share various types of information quickly while moving anywhere. Mobile's email applications are classified as one of the important applications to communicate ubiquitously since the use of email is considered as the best formal way for communication inside any organization. Due to this importance of e-mail and the daily needs of using it especially for faculty members and students, we propose to develop a mobile application for KFU E-Mail system with secure data transmission. The proposed application has encryption and decryption features to ensure security. As a result, the students and faculty members can communicate via the email application in a safer and more comfortable way.
... In recent years, advanced synthesis and design have been achieved in the development of new telecommunication and data sharing technologies such as mobile-based applications, cloud computing, and Internet of things (IoT) [6]. This, in turn, has raised the demand to develop secure communication over insecure channels for different applications. ...
... Many types of research have been conducted to ensure data security for many shapes of shared data. For example, the software-based Rivest-Shamir-Adleman (RSA) cryptosystem which is used to encrypt and decrypt text messages prior communicating them by sender and receiver [6]. On the other hand, there is a need for portable email version along with the one offered by KFU official website which enables the user to access the KFU email by the web-based links. ...
Nowadays, the development of innovative technology has emerged, particularly in mobile phones. People are often using smartphones daily in almost every aspect of their lives to use different applications and share various types of information quickly while moving anywhere. Mobile's email applications are classified as one of the important applications to communicate ubiquitously since the use of email is considered as the best formal way for communication inside any organization. Due to this importance of e-mail and the daily needs of using it especially for faculty members and students, we propose to develop a mobile application for KFU E-Mail system with secure data transmission. The proposed application has encryption and decryption features to ensure security. As a result, the students and faculty members can communicate via the email application in a safer and more comfortable way.