Search

Your search keyword '"RSA algorithm"' showing total 673 results

Search Constraints

Start Over You searched for: Descriptor "RSA algorithm" Remove constraint Descriptor: "RSA algorithm" Database Complementary Index Remove constraint Database: Complementary Index
673 results on '"RSA algorithm"'

Search Results

1. Verifiable Quantum Advantage without Structure.

2. AN ENHANCED RSA ALGORITHM TO COUNTER REPETITIVE CIPHERTEXT THREATS EMPOWERING USER-CENTRIC SECURITY.

3. Fast Color Image Encryption Algorithm Based on DNA Coding and Multi-Chaotic Systems.

4. An efficient confidentiality scheme based on quadratic chaotic map and Fibonacci sequence.

5. Developing a secure voice recognition service on Raspberry Pi.

6. A novel development to encrypt data communication under t-intuitionistic fuzzy environment.

7. An Improved Multi-Chaotic Public Key Algorithm Based on Chebyshev Polynomials.

8. Fuzzy logic and CPSO-optimized key management for secure communication in decentralized IoT networks: A lightweight solution.

9. Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal's Principles.

10. Sustainable Business Models for Innovative Urban Mobility Services.

11. Digital signature authentication using Rivest-Shamir-Adleman cryptographic algorithm.

12. Hybrid cryptosystem enhanced RSA and RC4 chaotic map: A tutorial.

13. Analysis of RSA and Shor's algorithm for cryptography: A quantum perspective.

14. A novel on comparative data security analysis in public auditing for trusted cloud service with SSL encryption over RSA algorithm.

15. Analysis on improved scheme for reversible data hiding for encrypted images.

16. 5G enabled IoT network and security in healthcare.

17. A secured self-financial management application with RSA encryption technology.

18. Improving the success rate of quantum algorithm attacking RSA encryption system.

19. A Review of Image Steganography Based on Multiple Hashing Algorithm.

20. Advancing cryptographic security: a novel hybrid AES-RSA model with byte-level tokenization.

21. A Biometric Key-Enhanced Multimedia Encryption Algorithm for Social Media Blockchain.

22. Customizable Fuzzy-Neuro Inference System Attack Detection Based on Trust for Mobile Wireless Sensor Networks.

23. Cybersecurity Enhancement through Hybrid Encryption: Combining RSA and Vigenère Algorithms in the Cypher-X System.

24. Design of an Alternative to Polynomial Modified RSA Algorithm.

25. Enhancing the Security of Classical Communication with Post-Quantum Authenticated-Encryption Schemes for the Quantum Key Distribution.

26. FROM THEORY TO PRACTICE: THE ROLE OF CRYPTOGRAPHY IN SECURING BLOCKCHAIN NETWORKS.

27. Dynamic Approach for Time Reduction in RSA Algorithm through Adaptive Data Encryption and Decryption.

28. A survey on lattice‐based security and authentication schemes for smart‐grid networks in the post‐quantum era.

29. Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature.

30. Estimation of the resonance frequency of rotational and translational signals evoked by mining-induced seismicity.

31. Boosting adversarial robustness via feature refinement, suppression, and alignment.

32. Blockchain-Based Quality Assurance System for Academic Programs.

33. A generic framework for blockchain-assisted on-chain auditing for off-chain storage.

34. Novel lightweight and fine-grained fast access control using RNS properties in fog computing.

35. Large file encryption in a Reduced-Round Permutation-Based AES file management system.

36. End-to-End Self-organizing Intelligent Security Model for Wireless Sensor Network based on a Hybrid (AES–RSA) Cryptography.

37. Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography.

38. A multiphase encryption scheme using RSA, modified RMAC and Chen's hyperchaotic map.

39. Reduction of complexity in asymmetric cryptography using RSA, RSA-CRT and novel N-prime RSA with different keys.

40. An efficient byzantine consensus mechanism based on healthcare sector in blockchain.

41. Progress in the prime factorization of large numbers.

42. Multiple colour image encryption using multiple parameter FrDCT, 3D Arnold transform and RSA.

43. An optimal multipath routing protocol using hybrid gravitational search particle swarm optimization for secure communication.

44. Event‐based privacy‐preserving security consensus of multi‐agent systems with encryption–decryption mechanism.

45. HAZARDOUS CHEMICALS LOGISTICS INTERNET OF VEHICLES BASED ON ENCRYPTION ALGORITHM.

46. Software implementation of systematic polar encoding based PKC-SPE cryptosystem for quantum cybersecurity.

47. A Hybrid Algorithm for Enhancement of the Data Security During Network Transmission Based on RSA, DH, and AES.

48. Towards Building a Faster and Incentive Enabled Privacy-Preserving Proof of Location Scheme from GTOTP.

49. Ripple spreading algorithm: a new method for solving multi-objective shortest path problems with mixed time windows.

50. E2EE enhanced patient-centric blockchain-based system for EHR management.

Catalog

Books, media, physical & digital resources