Search

Your search keyword '"RSA algorithm"' showing total 172 results

Search Constraints

Start Over You searched for: Descriptor "RSA algorithm" Remove constraint Descriptor: "RSA algorithm" Publisher springer nature Remove constraint Publisher: springer nature
172 results on '"RSA algorithm"'

Search Results

1. Fuzzy logic and CPSO-optimized key management for secure communication in decentralized IoT networks: A lightweight solution.

2. Customizable Fuzzy-Neuro Inference System Attack Detection Based on Trust for Mobile Wireless Sensor Networks.

3. A generic framework for blockchain-assisted on-chain auditing for off-chain storage.

4. Novel lightweight and fine-grained fast access control using RNS properties in fog computing.

5. Boosting adversarial robustness via feature refinement, suppression, and alignment.

6. End-to-End Self-organizing Intelligent Security Model for Wireless Sensor Network based on a Hybrid (AES–RSA) Cryptography.

7. A multiphase encryption scheme using RSA, modified RMAC and Chen's hyperchaotic map.

8. An efficient byzantine consensus mechanism based on healthcare sector in blockchain.

9. Progress in the prime factorization of large numbers.

10. Multiple colour image encryption using multiple parameter FrDCT, 3D Arnold transform and RSA.

11. Software implementation of systematic polar encoding based PKC-SPE cryptosystem for quantum cybersecurity.

12. Ripple spreading algorithm: a new method for solving multi-objective shortest path problems with mixed time windows.

13. A multi-layer composite identification scheme of cryptographic algorithm based on hybrid random forest and logistic regression model.

14. Secure image transmission through LTE wireless communications systems.

15. Timed-release encryption anonymous interaction protocol based on smart contract.

16. Practical attacks on small private exponent RSA: new records and new insights.

17. Blockchain-based privacy and security model for transactional data in large private networks.

18. Lightweight and authentic symmetric session key cryptosystem for client–server mobile communication.

19. An Efficient and Secure Communication Mechanism for Internet of Things Based Connected Devices.

20. Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication.

21. An Efficient Delay Aware Emergency Message Dissemination and Data Retrieval in Secure VANET-Cloud Environment.

22. An optimised homomorphic CRT-RSA algorithm for secure and efficient communication.

23. Secure certificate sharing based on Blockchain framework for online education.

24. Security enhancement of the cloud paradigm using a novel optimized crypto mechanism.

25. Quantum-resistance in blockchain networks.

26. Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing.

27. Trust-based secure routing and message delivery protocol for signal processing attacks in IoT applications.

28. Reversible data hiding in encrypted domain by signal reconstruction.

29. Exponential increment of RSA attack range via lattice based cryptanalysis.

30. Phylogenomic characterization of historic lumpy skin disease virus isolates from South Africa.

31. Algorithm substitution attacks against receivers.

32. Network Information Security Data Protection Based on Data Encryption Technology.

33. A parallel elliptic curve crypto-processor architecture with reduced clock cycle for FPGA platforms.

34. Research on the optimization of communication protocol in network security protocol.

35. Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains.

36. Challenges of post-quantum digital signing in real-world applications: a survey.

37. Intelligent privacy preservation proctol in wireless MANET for IoT applications using hybrid crow search-harris hawks optimization.

38. Cloud to cloud data migration using self sovereign identity for 5G and beyond.

39. Two-factor-based RSA key generation from fingerprint biometrics and password for secure communication.

40. Secure data transmission in a real-time network for a tele-training education system.

41. Spectrum resource optimization in elastic optical networks using dynamic RMSA.

42. Implementation of Efficient Security Algorithm and Performance Improvement Through ODMRP Protocol in VANET Environment.

43. An Improved RSA Technique with Efficient Data Integrity Verification for Outsourcing Database in Cloud.

44. Secured cloud SCADA system implementation for industrial applications.

45. Public key versus symmetric key cryptography in client–server authentication protocols.

46. A generic construction to build simple oblivious transfer protocols from homomorphic encryption schemes.

47. QMLFD Based RSA Cryptosystem for Enhancing Data Security in Public Cloud Storage System.

48. Public key encryption with filtered equality test revisited.

49. A double steganography model combining blockchain and interplanetary file system.

50. Authentic secret share creation techniques using visual cryptography with public key encryption.

Catalog

Books, media, physical & digital resources