Search

Your search keyword '"RSA algorithm"' showing total 57 results

Search Constraints

Start Over You searched for: Descriptor "RSA algorithm" Remove constraint Descriptor: "RSA algorithm" Database Supplemental Index Remove constraint Database: Supplemental Index
57 results on '"RSA algorithm"'

Search Results

1. Design of Data Encryption and Compression Methods.

2. The Difficulties and Decisions of Academic Misconduct in Information Forensics–A Case Study to Cryptographer.

3. SECURING AND ADVANCING ROAD SAFETY IN INTELLIGENT VEHICULAR NETWORKS FOR SEAMLESS AND SECURE COMMUNICATION.

4. Security Implementation on IoT using CoAP and Elliptical Curve Cryptography.

5. Computer Network Communication Security Encryption System Based on Ant Colony Optimization Algorithm.

6. Decentralized and collaborative approach to mobile crowdsensing by implementing continuous feedback between the nodes.

7. A Survey on Quantum Computing for Internet of Things Security.

8. Analysing RSA and PAILLIER homomorphic Property for security in Cloud.

9. An improved random bit-stuffing technique with a modified RSA algorithm for resisting attacks in information security (RBMRSA).

10. Secure Internet Voting Protocol (SIVP): A secure option for electoral processes.

11. Secure multi-cloud resource allocation with SDN and self-adaptive authentication.

12. RSA based encryption approach for preserving confidentiality of big data.

13. Data Encryption Dispute Resolutions under Intermediary Guidelines of Information Technology Act: Challenges and Future Framework.

14. Quantum Technology.

15. Towards a Foundation of a Mutual Authentication Protocol for a Robust and Resilient PUF-Based Communication Network.

16. RSA BASED SECRET KEY GENERATION AND AUTHORIZATION METHOD IN CLOUD BASED VANETS.

17. A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem.

18. Developing an Application for Researching the RSA Algorithm Behavior on a Multithread Platform.

19. The new Weakness of RSA and The Algorithm to Solve this Problem.

20. The new Weakness of RSA and The Algorithm to Solve this Problem.

21. Criptomoeda: o Bitcoin.

22. Computational ghost imaging encryption using RSA algorithm and discrete wavelet transform.

23. Fast and Area Efficient Implementation of RSA Algorithm.

24. An Approach Towards Image Encryption and Decryption using Quaternary Fractional-Linear Operations.

25. Information Protection Service using Topological Image Coverage.

26. Cost effective FPGA Implementation of Right-to-Left Modular Exponentiation with NAF-Representation.

27. An Efficient Image Encryption Scheme using Projective Transformations.

28. De-multiplexing the required spectrum in a traffic demand into multiple non-adjacent granular spectrums for dynamic traffic grooming in EON.

29. CK-RAID: Collaborative Knowledge Repository for Intrusion Detection System.

30. HIDE IMAGE AND TEXT USING LSB, DWT AND RSA BASED ON IMAGE STEGANOGRAPHY.

31. EFFICIENT RSA CRYPTOSYSTEM DECRYPTION BASED ON CHINESE REMAINDER THEOREM AND STRONG PRIME.

32. IMPLEMENTING ELLIPTIC CURVE CRYPTOGRAPHY USING MICROSOFT EXCEL.

33. Efficient Signature Schemes from R-LWE.

34. A Cloud-aided Group RSA Scheme in Java 8 Environment and OpenStack Software.

35. INTEGER FACTORIZATION IMPLEMENTATIONS.

36. RSA-type Algebra Structures.

37. A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish.

38. Comparative Analysis of Authenticated Key Agreement Protocols Based on Elliptic Curve Cryptography.

39. RSA Based Two-factor Remote User Authentication Scheme with User Anonymity.

40. Short Secret Exponent Attack on LSBS-RSA.

41. Routing and spectrum assignment employing long short-term memory technique for elastic optical networks.

42. Improvement in Rebalanced CRT RSA.

43. A Simple and Efficient Way to Combine Microcontrollers with RSA Cryptography.

44. Using Combined Pseudo-Random Number Generator with Digital Text-based Watermarking for Cryptography Application.

45. Multilevel Privacy Preserving in Distributed Environment using Cryptographic Technique.

46. E.Kesavulu Reddy Cryptosystem to Resistance against Simple Power Analysis Attacks in Mobile Devices.

47. Efficient FPGA Implementation of RSA Coprocessor Using Scalable Modules.

48. A Tiny RSA Cryptosystem based on Arduino Microcontroller Useful for Small Scale Networks.

49. Improved Shamir's CRT-RSA Algorithm: Revisit with the Modulus Chaining Method.

50. An improved pathfinder algorithm using opposition-based learning for tasks scheduling in cloud environment.

Catalog

Books, media, physical & digital resources