Search

Your search keyword '"RSA"' showing total 4,359 results

Search Constraints

Start Over You searched for: Descriptor "RSA" Remove constraint Descriptor: "RSA"
4,359 results on '"RSA"'

Search Results

101. Optimization of Distributed RSA Encryption and Decription Processing Using Process Scheduling Method In Single Board Computer Cluster Architecture (SBC).

102. Security enhancement of cyber-physical system using modified encryption AESGNRSA technique.

103. Comparative Effects of Two High-Intensity Intermittent Training Programs on Sub-Elite Male Basketball Referees' Fitness Levels.

104. Toddlers' physiological response to parent's mobile device distraction and technoference.

105. Modeling the effects of strigolactone levels on maize root system architecture.

106. Secure image transmission through LTE wireless communications systems.

107. Soluble Forms of Immune Checkpoints and Their Ligands as Potential Biomarkers in the Diagnosis of Recurrent Pregnancy Loss—A Preliminary Study.

108. Variations on a Miller–Rabin Theme.

109. Secure android IoT mobile and collaborative machine learning for controlling the management of enterprise.

110. OPTIMISING THE SUCCESSFUL OUTCOMES OF REVERSE SURAL ARTERY FLAP FOR LOWER EXTREMITY AND FOOT RECONSTRUCTION IN ELDERLY PATIENTS.

111. Comparison of cementless twin-peg, cemented twin-peg and cemented single-peg femoral component migration after medial unicompartmental knee replacement: a 5-year randomized RSA study.

112. Omalizumab rescue therapy in refractory status asthmaticus.

113. All-polyethylene versus metal-backed tibial components in total knee arthroplasty: a meta-analysis of randomized controlled trials.

114. Validity and Reliability of the Indonesian Version of Reflux Symptoms Score (RSS) and Reflux Sign Assessment (RSA).

115. Machine learning: the what, why, and how.

116. Subscapularis repair for reverse shoulder arthroplasty: a systematic review and meta-analysis.

117. Deep learning approach and cover image transportation: a multi-security adaptive image steganography scheme.

118. An Effective Data Security Mechanism for Secured Data Communications Using Hybrid Cryptographic Technique and Quantum Key Distribution.

119. Enhancing Key Exchange Security: Leveraging RSA Protocol in Encryption Algorithm Based on Hyperchaotic System.

120. The pragmatics of free choice any

121. Spatial representation of multidimensional information in emotional faces revealed by fMRI

122. نماذج تشفير باستخدام خوارزميتي RSA وAES

123. TPMScan: A wide-scale study of security-relevant properties of TPM 2.0 chips

124. Neural correlates of word representation vectors in natural language processing models: Evidence from representational similarity analysis of event‐related brain potentials

125. Surface Immune Checkpoints as Potential Biomarkers in Physiological Pregnancy and Recurrent Pregnancy Loss

126. Revision of a Failed Humeral Stem with Sufficient Bone Stock

130. A Comparison of the Key Size and Security Level of the ECC and RSA Algorithms with a Focus on Cloud/Fog Computing

131. The Role of Image Encryption and Decryption in Secure Communication: A Survey

132. Text Encryption Using ECC and Chaotic Map

133. Public Data Auditing Scheme Using RSA and Blockchain for Cloud Storage

134. Towards Roles and Responsibilities in a Cyber Security Awareness Framework for South African Small, Medium, and Micro Enterprises (SMMEs)

136. Zero-Knowledge Predicates for Hashing to Prime: Theory and Applications

137. Improved Cryptanalysis of the Multi-Power RSA Cryptosystem Variant

141. Securing Medical Images Using Quantum Key Distribution Scheme BB84

143. Quantencomputing und Programmierung

145. Location Aided Secure Routing System in Ad-Hoc Networks

146. A Review on Geo-location-Based Authentication with Various Lossless Compression Techniques

148. Development of a New Technique to Improve Security of Data in Remote Patient Monitoring System in Health Care

Catalog

Books, media, physical & digital resources