Search

Your search keyword '"rsa"' showing total 4,285 results

Search Constraints

Start Over You searched for: Descriptor "rsa" Remove constraint Descriptor: "rsa"
4,285 results on '"rsa"'

Search Results

1. New partial key exposure attacks on RSA with additive exponent blinding.

2. Stemless RSA shows good short-term radiological stability and clinical outcomes in elderly patients.

3. Distalization and lateralization shoulder angles: do they have a role in predicting postoperative clinical outcomes?

4. Limited preoperative forward flexion does not impact outcomes between anatomic or reverse shoulder arthroplasty for primary glenohumeral arthritis.

5. Does the subscapularis repair affect the clinical outcome after primary reverse shoulder arthroplasty?

6. Cryptography-based location privacy protection in the Internet of Vehicles.

7. Latent profiles of infant negative affect and respiratory sinus arrhythmia during the still‐face paradigm: The role of maternal sensitivity.

8. Application of RSAPSO Hybrid Optimizer for Parameter Extraction of Solar PV Cell Models under Temperature Variations.

9. Dysregulation of CREB5 Impairs Decidualization and Maternal–Fetal Interactions by Inhibiting Autophagy in Recurrent Spontaneous Abortion.

10. The Use of Large Metal Heads in Thin Vitamin E–Doped Cross-Linked Polyethylene Inserts Does Not Increase Polyethylene Wear in Total Hip Arthroplasty: 5-Year Results From a Randomized Controlled Trial.

11. Dynamic Approach for Time Reduction in RSA Algorithm through Adaptive Data Encryption and Decryption.

12. New partial key exposure attacks on RSA with additive exponent blinding

13. A Flexible and Balanced Hardware Architecture of RSA Modulo Exponentiation on FPGA

16. Speeding Up RSA Signature Verification

17. Cryptanalysis of a New Variant of the RSA Cryptosystem

18. Fast Color Image Security Standard for IoT Applications Using Gaussian Pyramid Based on Modified AES

19. Optimizing the Security and Privacy of Cloud Data Communication; Hybridizing Cryptography and Steganography Using Triple Key of AES, RSA and LSB with Deceptive QR Code Technique: A Novel Approach

21. A Cognitive Comparative Analysis of Geometric Shape-Based Cryptosystem

22. FPGA Implementation of Biological Feature Based Steganography Method

23. A Survey: Analysis of Existing Hybrid Cryptographic Techniques

25. Future Generation Elastic Optical Networks: A State-of-Art Review

26. Detecting Cyberattacks to Federated Learning on Software-Defined Networks

27. Everlasting ROBOT: The Marvin Attack

28. High-Order Collision Attack Vulnerabilities in Montgomery Ladder Implementations of RSA

29. Selective Text Encryption Using RSA for E-governance Applications for Pdf Document

30. Secure and Energy-Efficient Framework for Internet of Medical Things (IoMT)-Based Healthcare System

31. Cipher Attack Against the Assymetric Cipher RSA

32. A New Data Communication Method Using RSA and Steganography

33. Effect of Incremental Loading with Construction Sequence Analysis of an RCC Floating Column Building Located in High Seismic Prone Areas

35. A bioecological longitudinal study of depressive symptoms from pregnancy to 36 months postpartum.

36. Adaptive Steganography Using Improve Bit-plane Complexity Segmentation

37. Antioxidant capacity of Pleurotus ostreatus (Jacq.) P. Kumm influenced by growth substrates

38. Passwordless Authentication Using a Combination of Cryptography, Steganography, and Biometrics

39. Convolutional neural networks combined with conventional filtering to semantically segment plant roots in rapidly scanned X-ray computed tomography volumes with high noise levels

40. Antioxidant capacity of Pleurotus ostreatus (Jacq.) P. Kumm influenced by growth substrates.

41. Reversing chronic pseudoparesis secondary to massive, irreparable rotator cuff tear: superior capsular reconstruction vs. reverse total shoulder arthroplasty.

42. Radiologic, clinical, and patient-reported outcomes in stemless reverse shoulder arthroplasty at a mean of 46 months.

43. Enhancing Data Security through Machine Learning-based Key Generation and Encryption.

44. Improving communication security Against Quantum Algorithms Impact.

45. A multiphase encryption scheme using RSA, modified RMAC and Chen's hyperchaotic map.

46. Passwordless Authentication Using a Combination of Cryptography, Steganography, and Biometrics.

47. Lightweight authentication scheme based on Elliptic Curve El Gamal.

48. Cyber Security - Current and Future Trends.

49. Convolutional neural networks combined with conventional filtering to semantically segment plant roots in rapidly scanned X-ray computed tomography volumes with high noise levels.

50. Intrusion detection in cyber-physical system using rsa blockchain technology.

Catalog

Books, media, physical & digital resources