Search

Your search keyword '"RSA algorithm"' showing total 1,301 results

Search Constraints

Start Over You searched for: Descriptor "RSA algorithm" Remove constraint Descriptor: "RSA algorithm"
1,301 results on '"RSA algorithm"'

Search Results

201. Reversible data hiding in encrypted domain by signal reconstruction.

202. Shor's Factoring Algorithm and Modular Exponentiation Operators.

203. An Innovative Blockchain-Based Secured Logistics Management Architecture: Utilizing an RSA Asymmetric Encryption Method.

204. SDA-RDOS: A New Secure Data Aggregation Protocol for Wireless Sensor Networks in IoT Resistant to DOS Attacks.

205. Energy‐efficient and privacy‐preserving approach for Internet of Things nodes using a novel hybrid fuzzy water cycle and evaporation strategy and matrix‐based Rivest–Shamir–Adleman encryption algorithm.

206. BBNSF: Blockchain-Based Novel Secure Framework Using RP 2 -RSA and ASR-ANN Technique for IoT Enabled Healthcare Systems.

207. Analysing RSA and PAILLIER homomorphic Property for security in Cloud.

208. Comparison between RSA and CAST-128 with Adaptive Key for Video Frames Encryption with Highest Average Entropy.

209. Research on Secure Encryption and Transmission of Disaster Backup of Massive Data Based on Cloud Computing.

211. Analysis and Research of Data Encryption Technology in Network Communication Security

212. An Encryption Method of Power Cloud Data Based on n-RSA

214. A Study of Data Hiding Using Cryptography and Steganography

216. Voice Password-Based Secured Communication Using RSA and ElGamal Algorithm

217. New Constructions of Existential Unforgeable Aggregate Signature Scheme from CSP.

218. Design of digital image encryption based on elliptic curve cryptography (ECC) algorithm and Radix-64 conversion.

219. An Architecture for Managing Data Privacy in Healthcare with Blockchain.

220. Secure Location Privacy Transmitting Information on Cellular Networks.

221. High Efficiency Crypto-Watermarking System Based on Clifford-Multiwavelet for 3D Meshes Security.

222. Improving Security of Internet of Vehicles Based on Post-quantum Signatures with Systolic Divisions.

223. SCA-Safe Implementation of Modified SaMAL2R Algorithm in FPGA.

224. The Design of a Safe Charging System Based on PKS Architecture.

225. Constellation Encryption Design Based on Chaotic Sequence and the RSA Algorithm.

226. Enhanced Dual-Policy Attribute-Based Encryption for Secure Data Sharing in the Cloud.

227. Exponential increment of RSA attack range via lattice based cryptanalysis.

228. A Modified Reptile Search Algorithm for Numerical Optimization Problems.

229. Computer cyberspace security mechanism supported by cloud computing.

230. Phylogenomic characterization of historic lumpy skin disease virus isolates from South Africa.

231. Algorithm substitution attacks against receivers.

232. Secure Sensitive Data Sharing Using RSA and ElGamal Cryptographic Algorithms with Hash Functions.

233. RSA encrypted FSK RF transmission powered by an innovative microwave technique for invulnerable security.

234. Network Information Security Data Protection Based on Data Encryption Technology.

235. On the Existence of Multiple RSA Private Keys.

236. Big Data Sharing Model and Key Mechanism of International Trade Based on Blockchain.

237. A parallel elliptic curve crypto-processor architecture with reduced clock cycle for FPGA platforms.

238. On (Unknowingly) Using Near-Square RSA Primes.

239. An Image Encryption Algorithm Based on Complex Network Scrambling and Multi-Directional Diffusion.

240. Post-Quantum Secure Password-Authenticated Key Exchange Based on Ouroboros.

241. A secure neural network‐based ranking approach for document searching in cloud data center.

242. HYBRID ENCRYPTION USING LSB STEGANOGRAPHY AND RSA.

244. Hybrid Approach to Enhance Data Security on Cloud

246. A New Modified Version of Standard RSA Cryptography Algorithm

247. Research on Blind Signature Based Anonymous Electronic Cash Scheme

248. A Robust Zero-Watermarking Algorithm for Medical Images Using Curvelet-Dct and RSA Pseudo-random Sequences

Catalog

Books, media, physical & digital resources