Search

Your search keyword '"RSA algorithm"' showing total 74 results

Search Constraints

Start Over You searched for: Descriptor "RSA algorithm" Remove constraint Descriptor: "RSA algorithm" Publisher hindawi limited Remove constraint Publisher: hindawi limited
74 results on '"RSA algorithm"'

Search Results

1. Feasibility Analysis of Cracking RSA with Improved Quantum Circuits of the Shor's Algorithm.

2. Secure Control Using Homomorphic Encryption and Efficiency Analysis.

3. Information Security Protection of Internet of Energy Using Ensemble Public Key Algorithm under Big Data.

4. Full Data-Processing Power Load Forecasting Based on Vertical Federated Learning.

5. New Constructions of Existential Unforgeable Aggregate Signature Scheme from CSP.

6. Enhanced Dual-Policy Attribute-Based Encryption for Secure Data Sharing in the Cloud.

7. A Modified Reptile Search Algorithm for Numerical Optimization Problems.

8. On the Existence of Multiple RSA Private Keys.

9. Big Data Sharing Model and Key Mechanism of International Trade Based on Blockchain.

10. Post-Quantum Secure Password-Authenticated Key Exchange Based on Ouroboros.

11. Application of Data Encryption Technology in Computer Network Information Security.

12. Application of Data Image Encryption Technology in Computer Network Information Security.

13. Application Research of Data Encryption Algorithm in Computer Security Management.

14. Analysis of Co-Construction and Sharing Mechanism of Digital Education Resources based on Digital Information Encryption Technology.

15. A Study on Scalar Multiplication Parallel Processing for X25519 Decryption of 5G Core Network SIDF Function for mMTC IoT Environment.

16. Application Research in Computer Vision Signature Encryption System of Enterprise Contract Economic Management.

17. Secure Model for IoT Healthcare System under Encrypted Blockchain Framework.

18. Improving the Application of Blockchain Technology for Financial Security in Supply Chain Integrated Business Intelligence.

19. Network Blockchain Security Sharing Model Based on Fuzzy Logic.

20. Secure and Efficient Data Storage Operations by Using Intelligent Classification Technique and RSA Algorithm in IoT-Based Cloud Computing.

21. Towards Designing Personal Health Information Management System Based on Java.

22. Analysis of Data Encryption Algorithms for Telecommunication Network-Computer Network Communication Security.

23. Hybrid Encryption Scheme for Hospital Financial Data Based on Noekeon Algorithm.

24. An Efficient and Secure Session Key Management Scheme in Wireless Sensor Network.

25. A Privacy-Preserving Identity Authentication Scheme Based on the Blockchain.

26. CLE against SOA with Better Data Security Storage to Cloud 5G.

27. Efficient Ciphertext-Policy Attribute-Based Encryption Constructions with Outsourced Encryption and Decryption.

28. Traceable Multiauthority Attribute-Based Encryption with Outsourced Decryption and Hidden Policy for CIoT.

29. An Image Encryption Scheme Based on Lorenz Hyperchaotic System and RSA Algorithm.

30. Quantum Election Protocol Based on Quantum Public Key Cryptosystem.

31. Visually Meaningful Image Encryption Scheme Based on DWT and Schur Decomposition.

32. Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function.

33. An Atomic Cross-Chain Swap-Based Management System in Vehicular Ad Hoc Networks.

34. Blockchain-Enabled Public Key Encryption with Multi-Keyword Search in Cloud Computing.

35. An Efficient Pairing-Free Certificateless Searchable Public Key Encryption for Cloud-Based IIoT.

36. Two-Round Password-Based Authenticated Key Exchange from Lattices.

37. A Fully Secure KP-ABE Scheme on Prime-Order Bilinear Groups through Selective Techniques.

38. AKC-Based Revocable ABE Schemes from LWE Assumption.

39. Achieving Message-Encapsulated Leveled FHE for IoT Privacy Protection.

40. Practical CCA-Secure Functional Encryptions for Deterministic Functions.

41. A Novel RLWE-Based Anonymous Mutual Authentication Protocol for Space Information Network.

42. A Lattice-Based Authentication Scheme for Roaming Service in Ubiquitous Networks with Anonymity.

43. Image Encryption Scheme Based on a Generalized Arnold Map and RSA Algorithm.

44. An Indistinguishably Secure Function Encryption Scheme.

45. CCA Secure Public Key Encryption against After-the-Fact Leakage without NIZK Proofs.

46. An Efficient Framework for Sharing a File in a Secure Manner Using Asymmetric Key Distribution Management in Cloud Environment.

47. A Secure Data Sharing Scheme with Designated Server.

48. Under Quantum Computer Attack: Is Rainbow a Replacement of RSA and Elliptic Curves on Hardware?

49. Efficient arithmetic on ARM-NEON and its application for high-speed RSA implementation.

50. Generalized RSA using 2k prime numbers with secure key generation.

Catalog

Books, media, physical & digital resources