Search

Your search keyword '"RSA algorithm"' showing total 47 results

Search Constraints

Start Over You searched for: Descriptor "RSA algorithm" Remove constraint Descriptor: "RSA algorithm" Database Springer Nature eBooks Remove constraint Database: Springer Nature eBooks
47 results on '"RSA algorithm"'

Search Results

1. Design and Develop a Hybrid Encryption Techniques for Securing Data on Banking Systems Over Cloud

2. Chaotic System Image Encryption Algorithm Base RSA

6. REMICARE—Medicine Intake Tracker and Healthcare Assistant

7. Combined Cryptography and Text Steganography for Enhanced Security Based on Number System

8. Efficient Data Hiding Model by Using RDH Algorithm

9. Design and Implementation of Secure Location Service Using Software Engineering Approach in the Age of Industry 4.0

10. Secure Data Hiding and Extraction Using RSA Algorithm

11. A New Encryption Scheme Based on RSA Encryption Algorithm and Chen Chaotic System

12. Data Security in Cloud with Hybrid Homomorphic Encryption Technique Using GM–RSA Algorithm

13. Image Encryption Using RSA Algorithm

14. Analysis and Test of RSA Algorithm in Smart Electricity Meter Identity Authentication

15. Optimization of Prime Decision Algorithm in RSA Algorithm

17. Analysis and Research of Data Encryption Technology in Network Communication Security

18. An Encryption Method of Power Cloud Data Based on n-RSA

20. A Study of Data Hiding Using Cryptography and Steganography

22. Voice Password-Based Secured Communication Using RSA and ElGamal Algorithm

24. Hybrid Approach to Enhance Data Security on Cloud

26. A New Modified Version of Standard RSA Cryptography Algorithm

27. Research on Blind Signature Based Anonymous Electronic Cash Scheme

28. A Robust Zero-Watermarking Algorithm for Medical Images Using Curvelet-Dct and RSA Pseudo-random Sequences

30. Encryption Using Logistic Map and RSA Algorithm

31. Secure Data Transfer by Implementing Mixed Algorithms

33. Improved Key Generation Scheme of RSA (IKGSR) Algorithm Based on Offline Storage for Cloud

34. Securing Medical Images for Mobile Health Systems Using a Combined Approach of Encryption and Steganography

35. Public Network Security by Bluffing the Intruders Through Encryption Over Encryption Using Public Key Cryptography Method

36. Multipath Load Balancing and Secure Adaptive Routing Protocol for Service Oriented WSNs

39. An Add-on to Present Banking: m-banking

41. Elements of Number Theory and Cryptography

Catalog

Books, media, physical & digital resources