Search

Your search keyword '"RSA algorithm"' showing total 162 results

Search Constraints

Start Over You searched for: Descriptor "RSA algorithm" Remove constraint Descriptor: "RSA algorithm" Topic data encryption Remove constraint Topic: data encryption
162 results on '"RSA algorithm"'

Search Results

1. AN ENHANCED RSA ALGORITHM TO COUNTER REPETITIVE CIPHERTEXT THREATS EMPOWERING USER-CENTRIC SECURITY.

2. Dynamic Approach for Time Reduction in RSA Algorithm through Adaptive Data Encryption and Decryption.

3. Design of Data Encryption and Compression Methods.

4. Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature.

5. Large file encryption in a Reduced-Round Permutation-Based AES file management system.

6. An optimal multipath routing protocol using hybrid gravitational search particle swarm optimization for secure communication.

7. Event‐based privacy‐preserving security consensus of multi‐agent systems with encryption–decryption mechanism.

8. E2EE enhanced patient-centric blockchain-based system for EHR management.

9. Data Security in Cloud Environment by Using Hybrid Encryption Technique: A Comprehensive Study on Enhancing Confidentiality and Reliability.

10. Designing and building a web-based electronic service manuscript application by making comparisons of AES and blowfish algorithms for securing data in the database.

11. A Comprehensive Analysis: Evaluating Security Characteristics of Xbee Devices against Zigbee Protocol.

12. Multiauthority Ciphertext Policy-Attribute-Based Encryption (MA-CP-ABE) with Revocation and Computation Outsourcing for Resource-Constraint Devices.

13. On a Generalization of RSA Crypto-system By Using 2-Cyclic Refined Integers.

14. Wireless Sensor Network Security Analysis for Data and Aggregation.

15. Enhancing Organizational Data Security on Employee-Connected Devices Using BYOD Policy.

16. Saving the internet.

17. Information Security Protection of Internet of Energy Using Ensemble Public Key Algorithm under Big Data.

18. Trust-based secure routing and message delivery protocol for signal processing attacks in IoT applications.

19. 集群式农产品供应链区块链密文策略可验多部门监管方案.

20. HYBRID APPROACHES IN CRYPTOGRAPHY.

21. SECURE AND EFFICIENT DATA TRANSFER IN AODV ROUTING PROTOCOL USING RSA ENCRYPTION.

22. A STUDY AND COMPARISON OF THE VARIOUS CRYPTOGRAPHY TECHNIQUE STANDARDS WITHIN FIFTEEN FACTORS.

23. BBNSF: Blockchain-Based Novel Secure Framework Using RP 2 -RSA and ASR-ANN Technique for IoT Enabled Healthcare Systems.

24. Comparison between RSA and CAST-128 with Adaptive Key for Video Frames Encryption with Highest Average Entropy.

25. Research on Secure Encryption and Transmission of Disaster Backup of Massive Data Based on Cloud Computing.

26. Enhanced Dual-Policy Attribute-Based Encryption for Secure Data Sharing in the Cloud.

27. Computer cyberspace security mechanism supported by cloud computing.

28. Algorithm substitution attacks against receivers.

29. Network Information Security Data Protection Based on Data Encryption Technology.

30. Big Data Sharing Model and Key Mechanism of International Trade Based on Blockchain.

31. A secure neural network‐based ranking approach for document searching in cloud data center.

32. Intelligent privacy preservation proctol in wireless MANET for IoT applications using hybrid crow search-harris hawks optimization.

33. Application of Data Encryption Technology in Computer Network Information Security.

34. Application of Data Image Encryption Technology in Computer Network Information Security.

35. Application Research of Data Encryption Algorithm in Computer Security Management.

36. Analysis of Co-Construction and Sharing Mechanism of Digital Education Resources based on Digital Information Encryption Technology.

37. S.O.S. Save Our Secrets.

38. Data Encryption Dispute Resolutions under Intermediary Guidelines of Information Technology Act: Challenges and Future Framework.

39. Medical Image Compression and Encryption Using Adaptive Arithmetic Coding, Quantization Technique and RSA in DWT Domain.

40. Enhanced CP-ABE with RSA for Secure and Revocable Data Transmission of Big Data in Cloud.

41. Hybrid HOG-SVM encrypted face detection and recognition model.

42. Analysis of Data Encryption Algorithms for Telecommunication Network-Computer Network Communication Security.

43. Hybrid symmetric cryptography approach for secure communication in web application.

44. High speed data encryption technique with optimized memory based RSA algorithm for communications.

45. Strong leakage-resilient encryption: enhancing data confidentiality by hiding partial ciphertext.

46. ПРОЕКТУВАННЯ ЗАХИСНИХ СИСТЕМ НА БАЗІ ФРАКТАЛЬНИХ АЛГОРИТМІВ.

47. A hybrid encryption scheme based on optical scanning cryptography and Fibonacci–Lucas transformation.

48. Elliptic curve Diffie–Hellman cryptosystem in big data cloud security.

49. A New Framework of IND-CCA Secure Public Key Encryption with Keyword Search.

50. Analytical Method to Compute the Cloud Computing Data Security Issues by Using Encryption Algorithms.

Catalog

Books, media, physical & digital resources