Search

Your search keyword '"RSA algorithm"' showing total 130 results

Search Constraints

Start Over You searched for: Descriptor "RSA algorithm" Remove constraint Descriptor: "RSA algorithm" Topic data security Remove constraint Topic: data security
130 results on '"RSA algorithm"'

Search Results

1. AN ENHANCED RSA ALGORITHM TO COUNTER REPETITIVE CIPHERTEXT THREATS EMPOWERING USER-CENTRIC SECURITY.

2. An efficient confidentiality scheme based on quadratic chaotic map and Fibonacci sequence.

3. Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal's Principles.

4. A novel on comparative data security analysis in public auditing for trusted cloud service with SSL encryption over RSA algorithm.

5. A secured self-financial management application with RSA encryption technology.

6. Advancing cryptographic security: a novel hybrid AES-RSA model with byte-level tokenization.

7. Cybersecurity Enhancement through Hybrid Encryption: Combining RSA and Vigenère Algorithms in the Cypher-X System.

8. Large file encryption in a Reduced-Round Permutation-Based AES file management system.

9. An optimal multipath routing protocol using hybrid gravitational search particle swarm optimization for secure communication.

10. Event‐based privacy‐preserving security consensus of multi‐agent systems with encryption–decryption mechanism.

11. A Hybrid Algorithm for Enhancement of the Data Security During Network Transmission Based on RSA, DH, and AES.

12. Data Security in Cloud Environment by Using Hybrid Encryption Technique: A Comprehensive Study on Enhancing Confidentiality and Reliability.

13. Enhancing Key Exchange Security: Leveraging RSA Protocol in Encryption Algorithm Based on Hyperchaotic System.

14. A survey on symmetric text encryption techniques.

15. A new authentication RSA homomorphic encryption technique for prime factorization-based attacks scheme using Brahmagupta Fibonacci identity for cloud data security.

16. Advances in data security through elliptical curve cryptography.

17. Cloud Security with Lightweight ABE on Mobile IoT Devices.

18. An Efficient and Secure Fog Based Routing Mechanism in IoT Network.

19. DEVELOPING A NEW ENCRYPTION ALGORITHM FOR IMAGES TRANSMITTED THROUGH WSN SYSTEMS.

20. Blockchain Privacy Protection Based on Post Quantum Threshold Algorithm.

21. Wireless Sensor Network Security Analysis for Data and Aggregation.

22. Comparative Study of RSA Asymmetric Algorithm and AES Algorithm for Data Security

23. Design of hybrid cryptosystem using AES and SHA-1 algorithms.

24. Data Security in Cloud with Hybrid Homomorphic Encryption Technique Using GM–RSA Algorithm

25. Analysis and Test of RSA Algorithm in Smart Electricity Meter Identity Authentication

26. Enhancing Organizational Data Security on Employee-Connected Devices Using BYOD Policy.

27. A Secure Method for Data Storage and Transmission in Sustainable Cloud Computing.

28. Security enhancement of the cloud paradigm using a novel optimized crypto mechanism.

29. IMPLEMENTATION OF CRYPTOGRAPHIC ALGORITHMS USING MOORE MACHINE AND RECURRENCE MATRIX.

30. Ensuring confidentiality and privacy of cloud data using a non-deterministic cryptographic scheme.

31. A STUDY AND COMPARISON OF THE VARIOUS CRYPTOGRAPHY TECHNIQUE STANDARDS WITHIN FIFTEEN FACTORS.

32. IMPLICATIONS OF THE ARITHMETIC RATIO OF PRIME NUMBERS FOR RSA SECURITY.

33. Computer cyberspace security mechanism supported by cloud computing.

34. Big Data Sharing Model and Key Mechanism of International Trade Based on Blockchain.

35. HYBRID ENCRYPTION USING LSB STEGANOGRAPHY AND RSA.

37. Hybrid Approach to Enhance Data Security on Cloud

38. Secure framework for IoT technology based on RSA and DNA cryptography.

39. Cloud to cloud data migration using self sovereign identity for 5G and beyond.

40. Secure data transmission in a real-time network for a tele-training education system.

41. Program for Simulation and Testing of Apply Cryptography of Advance Encryption Standard (AES) Algorithm with Rivest-Shamir-Adleman (RSA) Algorithm for Good Performance.

42. An improved random bit-stuffing technique with a modified RSA algorithm for resisting attacks in information security (RBMRSA).

43. Frequency Domain Horizontal Cross Correlation Analysis of RSA.

44. An Improved RSA Technique with Efficient Data Integrity Verification for Outsourcing Database in Cloud.

45. Digital image watermarking in sparse domain.

46. Enhanced CP-ABE with RSA for Secure and Revocable Data Transmission of Big Data in Cloud.

47. Secure Data Transfer by Implementing Mixed Algorithms

48. Evolvable Hardware-Based Data Security System Using Image Steganography Through Dynamic Partial Reconfiguration.

49. Post-quantum cryptography-driven security framework for cloud computing.

50. QMLFD Based RSA Cryptosystem for Enhancing Data Security in Public Cloud Storage System.

Catalog

Books, media, physical & digital resources