Search

Your search keyword '"RSA algorithm"' showing total 1,301 results

Search Constraints

Start Over You searched for: Descriptor "RSA algorithm" Remove constraint Descriptor: "RSA algorithm"
1,301 results on '"RSA algorithm"'

Search Results

101. Robust multifunctional watermarking system based zero-watermarking and polar harmonic Fourier moments.

102. Feasibility Analysis of Cracking RSA with Improved Quantum Circuits of the Shor's Algorithm.

103. Blockchain-based privacy and security model for transactional data in large private networks.

104. A Comprehensive Analysis: Evaluating Security Characteristics of Xbee Devices against Zigbee Protocol.

105. Linear-time 2-party secure merge from additively homomorphic encryption.

106. Cryptanalysis of RSA with small difference of primes and two decryption exponents: Jochemsz and May approach.

107. Fractal-Based Hybrid Cryptosystem: Enhancing Image Encryption with RSA, Homomorphic Encryption, and Chaotic Maps.

108. Cloud Security with Lightweight ABE on Mobile IoT Devices.

109. Multiauthority Ciphertext Policy-Attribute-Based Encryption (MA-CP-ABE) with Revocation and Computation Outsourcing for Resource-Constraint Devices.

110. High-Performance Multi-RNS-Assisted Concurrent RSA Cryptosystem Architectures.

111. Lightweight and authentic symmetric session key cryptosystem for client–server mobile communication.

112. An Efficient and Secure Communication Mechanism for Internet of Things Based Connected Devices.

113. An improved reptile search algorithm based on mathematical optimization accelerator and elementary functions.

114. A New Idea for RSA Backdoors.

115. A Novel and Secure Fake-Modulus Based Rabin-Ӡ Cryptosystem.

116. A New RSA Variant Based on Elliptic Curves.

117. An Efficient and Secure Fog Based Routing Mechanism in IoT Network.

118. A Symmetric Key and Elliptic Curve Cryptography-Based Protocol for Message Encryption in Unmanned Aerial Vehicles.

119. Localisation of facts compensator using reptile search algorithm for enhancing power system security under multi‐contingency conditions.

120. New key management scheme lattice-based for clustered wireless sensor networks.

121. DEVELOPING A NEW ENCRYPTION ALGORITHM FOR IMAGES TRANSMITTED THROUGH WSN SYSTEMS.

122. Yeni önerilmiş ikili fare sürüsü algoritması.

123. Security Implementation on IoT using CoAP and Elliptical Curve Cryptography.

124. Generalization of RSA cryptosystem based on 2n primes.

125. Encrypted model predictive control design for security to cyberattacks.

126. A generic model for security algorithms in mobile electronic payment systems.

127. Computer Network Communication Security Encryption System Based on Ant Colony Optimization Algorithm.

128. 几类纠错码及其相关 McEliece 密码体制.

129. Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication.

130. A Comparative Analysis of Traditional and Lightweight Algorithms.

131. Blockchain Privacy Protection Based on Post Quantum Threshold Algorithm.

132. On a Generalization of RSA Crypto-system By Using 2-Cyclic Refined Integers.

133. An Efficient Delay Aware Emergency Message Dissemination and Data Retrieval in Secure VANET-Cloud Environment.

134. An optimised homomorphic CRT-RSA algorithm for secure and efficient communication.

135. Wireless Sensor Network Security Analysis for Data and Aggregation.

136. Incorrectly Generated RSA Keys: How I Learned To Stop Worrying And Recover Lost Plaintexts.

137. 经典启发式量子计算整数分解问题.

138. A Novel Approach for Ticket Generation and Validation using RSA and Keccak Algorithms.

139. Comparative Study of RSA Asymmetric Algorithm and AES Algorithm for Data Security

140. The quest for perfect security.

142. Design of hybrid cryptosystem using AES and SHA-1 algorithms.

143. Secure Data Hiding and Extraction Using RSA Algorithm

144. A New Encryption Scheme Based on RSA Encryption Algorithm and Chen Chaotic System

145. Data Security in Cloud with Hybrid Homomorphic Encryption Technique Using GM–RSA Algorithm

146. Image Encryption Using RSA Algorithm

147. Analysis and Test of RSA Algorithm in Smart Electricity Meter Identity Authentication

148. Optimization of Prime Decision Algorithm in RSA Algorithm

149. 远程医疗信息系统中的三因素匿名认证协议.

150. Enhancing Organizational Data Security on Employee-Connected Devices Using BYOD Policy.

Catalog

Books, media, physical & digital resources