Search

Your search keyword '"RSA algorithm"' showing total 113 results

Search Constraints

Start Over You searched for: Descriptor "RSA algorithm" Remove constraint Descriptor: "RSA algorithm" Publisher elsevier b.v. Remove constraint Publisher: elsevier b.v.
113 results on '"RSA algorithm"'

Search Results

1. Design of Data Encryption and Compression Methods.

2. The Difficulties and Decisions of Academic Misconduct in Information Forensics–A Case Study to Cryptographer.

3. Robust multifunctional watermarking system based zero-watermarking and polar harmonic Fourier moments.

4. Security Implementation on IoT using CoAP and Elliptical Curve Cryptography.

5. Computer Network Communication Security Encryption System Based on Ant Colony Optimization Algorithm.

6. Event-Triggered Impulsive Controller Design for Synchronization of Delayed Chaotic Neural Networks and Its Fractal Reconstruction: An Application to Image Encryption.

7. Decentralized and collaborative approach to mobile crowdsensing by implementing continuous feedback between the nodes.

8. A Survey on Quantum Computing for Internet of Things Security.

9. Analysing RSA and PAILLIER homomorphic Property for security in Cloud.

10. An improved random bit-stuffing technique with a modified RSA algorithm for resisting attacks in information security (RBMRSA).

11. Secure cloud model for intellectual privacy protection of arithmetic expressions in source codes using data obfuscation techniques.

12. Secure Internet Voting Protocol (SIVP): A secure option for electoral processes.

13. An improved parallel Random Sequential Addition algorithm in RMC code for dispersion fuel analysis.

14. Partial prime factor exposure attacks on some RSA variants.

15. Secure multi-cloud resource allocation with SDN and self-adaptive authentication.

16. RSA based encryption approach for preserving confidentiality of big data.

17. Parallel and bias-free RSA algorithm for maximal Poisson-sphere sampling.

18. A Wiener-type attack on an RSA-like cryptosystem constructed from cubic Pell equations.

19. Towards a Foundation of a Mutual Authentication Protocol for a Robust and Resilient PUF-Based Communication Network.

20. A logarithmic-sized accountable ring signature scheme in the standard model.

21. Identity-based encryption with equality test and datestamp-based authorization mechanism.

22. Extended partial key exposure attacks on RSA: Improvement up to full size decryption exponents.

23. A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem.

24. Refractory high entropy superalloys (RSAs).

25. Tightly secure inner product functional encryption: Multi-input and function-hiding constructions.

26. Fast rebalanced RSA signature scheme with typical prime generation.

27. Constrained pseudorandom functions from functional encryption.

28. Novel updatable identity-based hash proof system and its applications.

29. High-performance montgomery modular multiplier with NTT and negative wrapped convolution.

30. Online/offline attribute-based searchable encryption revised: Flexibility, security and efficiency.

31. Computational ghost imaging encryption using RSA algorithm and discrete wavelet transform.

32. Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions.

33. Structure-preserving public-key encryption with leakage-resilient CCA security.

34. A privacy encryption algorithm based on an improved chaotic system.

35. An optical image compression and encryption scheme based on compressive sensing and RSA algorithm.

36. Fast and Area Efficient Implementation of RSA Algorithm.

37. An Approach Towards Image Encryption and Decryption using Quaternary Fractional-Linear Operations.

38. Information Protection Service using Topological Image Coverage.

39. Cost effective FPGA Implementation of Right-to-Left Modular Exponentiation with NAF-Representation.

40. An Efficient Image Encryption Scheme using Projective Transformations.

41. De-multiplexing the required spectrum in a traffic demand into multiple non-adjacent granular spectrums for dynamic traffic grooming in EON.

42. An enhancement of EAACK using P2P ACK and RSA public key cryptography.

43. Determining the Comparative Value of Pharmaceutical Risk-Sharing Policies in Non-Small Cell Lung Cancer Using Real-World Data.

44. Partial key exposure attacks on RSA: Achieving the Boneh–Durfee bound.

45. High nonlinearity of BEV's stepped automatic transmission design objectives and its optimal solution by a novel ISA-RSA.

46. A finite element model for 3D printed recycled parts from end-of-life wind turbine blades.

47. Random distribution of polydisperse ellipsoidal inclusions and homogenization estimates for porous elastic materials.

48. A fast digit based Montgomery multiplier designed for FPGAs with DSP resources.

49. Chaotic synchronization cryptosystems combined with RSA encryption algorithm.

50. An efficient RSA-based certificateless public key encryption scheme.

Catalog

Books, media, physical & digital resources