Search

Your search keyword '"RSA algorithm"' showing total 1,336 results

Search Constraints

Start Over You searched for: Descriptor "RSA algorithm" Remove constraint Descriptor: "RSA algorithm"
1,336 results on '"RSA algorithm"'

Search Results

151. DEVELOPING A NEW ENCRYPTION ALGORITHM FOR IMAGES TRANSMITTED THROUGH WSN SYSTEMS.

152. Yeni önerilmiş ikili fare sürüsü algoritması.

153. Security Implementation on IoT using CoAP and Elliptical Curve Cryptography.

154. Encrypted model predictive control design for security to cyberattacks.

155. Generalization of RSA cryptosystem based on 2n primes.

156. Robust multifunctional watermarking system based zero-watermarking and polar harmonic Fourier moments.

157. The quest for perfect security.

158. Design of hybrid cryptosystem using AES and SHA-1 algorithms.

159. Comparative Study of RSA Asymmetric Algorithm and AES Algorithm for Data Security

160. A generic model for security algorithms in mobile electronic payment systems.

161. Computer Network Communication Security Encryption System Based on Ant Colony Optimization Algorithm.

162. On a Generalization of RSA Crypto-system By Using 2-Cyclic Refined Integers.

163. Blockchain Privacy Protection Based on Post Quantum Threshold Algorithm.

164. An Efficient Delay Aware Emergency Message Dissemination and Data Retrieval in Secure VANET-Cloud Environment.

165. 几类纠错码及其相关 McEliece 密码体制.

166. Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication.

167. A Comparative Analysis of Traditional and Lightweight Algorithms.

168. Wireless Sensor Network Security Analysis for Data and Aggregation.

169. Incorrectly Generated RSA Keys: How I Learned To Stop Worrying And Recover Lost Plaintexts.

170. An optimised homomorphic CRT-RSA algorithm for secure and efficient communication.

171. 经典启发式量子计算整数分解问题.

172. A Novel Approach for Ticket Generation and Validation using RSA and Keccak Algorithms.

173. Delegating signing rights in a multivariate proxy signature scheme.

174. 远程医疗信息系统中的三因素匿名认证协议.

175. Enhancing Organizational Data Security on Employee-Connected Devices Using BYOD Policy.

176. 基于类梅森数的物联网密钥交换快速取模算法.

177. A Secure Method for Data Storage and Transmission in Sustainable Cloud Computing.

178. Secure certificate sharing based on Blockchain framework for online education.

179. Security enhancement of the cloud paradigm using a novel optimized crypto mechanism.

180. Modified Adhoc On-Demand Distance Vector for Trust Evaluation And Attack Detection.

181. Secure Data Hiding and Extraction Using RSA Algorithm

182. A New Encryption Scheme Based on RSA Encryption Algorithm and Chen Chaotic System

183. Data Security in Cloud with Hybrid Homomorphic Encryption Technique Using GM–RSA Algorithm

184. Image Encryption Using RSA Algorithm

185. Analysis and Test of RSA Algorithm in Smart Electricity Meter Identity Authentication

186. Optimization of Prime Decision Algorithm in RSA Algorithm

187. Secure framework for IoT technology based on RSA and DNA cryptography

188. A Novel MPPT Based Reptile Search Algorithm for Photovoltaic System under Various Conditions.

189. Registered Data-Centered Lab Management System Based on Data Ownership Safety Architecture.

190. Secure Control Using Homomorphic Encryption and Efficiency Analysis.

191. Quantum-resistance in blockchain networks.

192. Exploring the Intersection of Lattice Attacks and Blockchain Technology: A Heuristic Approach Using TPM2.0 ECDSA to Ascertain and Approach the Boundary.

193. A Secure and High Capacity Image Steganography Approach Using Huffman Coding and RSA Encryption.

194. Research on CLIB Routing and Spectrum Allocation Algorithm in Elastic Optical Networks.

195. Some Properties of the Computation of the Modular Inverse with Applications in Cryptography.

196. A survey on attribute-based encryption for Internet of Things.

197. An Efficient and Secure Model Using Adaptive Optimal Deep Learning for Task Scheduling in Cloud Computing.

198. Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing.

199. Event-Triggered Impulsive Controller Design for Synchronization of Delayed Chaotic Neural Networks and Its Fractal Reconstruction: An Application to Image Encryption.

200. Decentralized and collaborative approach to mobile crowdsensing by implementing continuous feedback between the nodes.

Catalog

Books, media, physical & digital resources