咨询与建议

限定检索结果

文献类型

  • 101 篇 会议
  • 86 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 190 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 168 篇 工学
    • 110 篇 计算机科学与技术...
    • 67 篇 电气工程
    • 54 篇 信息与通信工程
    • 18 篇 电子科学与技术(可...
    • 18 篇 控制科学与工程
    • 17 篇 网络空间安全
    • 16 篇 软件工程
    • 8 篇 石油与天然气工程
    • 7 篇 仪器科学与技术
    • 7 篇 材料科学与工程(可...
    • 6 篇 机械工程
    • 5 篇 光学工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 力学(可授工学、理...
    • 1 篇 动力工程及工程热...
  • 39 篇 理学
    • 20 篇 数学
    • 17 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 化学
    • 1 篇 生物学
  • 20 篇 管理学
    • 11 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 4 篇 公共管理
  • 7 篇 医学
    • 4 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 2 篇 经济学
    • 1 篇 理论经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 190 篇 rsa algorithm
  • 36 篇 encryption
  • 30 篇 cryptography
  • 21 篇 decryption
  • 11 篇 security
  • 10 篇 public key
  • 9 篇 public key crypt...
  • 9 篇 private key
  • 8 篇 data security
  • 7 篇 cloud computing
  • 7 篇 fpga
  • 6 篇 modular multipli...
  • 6 篇 aes algorithm
  • 6 篇 steganography
  • 5 篇 image encryption
  • 5 篇 montgomery algor...
  • 5 篇 rsa
  • 5 篇 wireless sensor ...
  • 5 篇 digital signatur...
  • 4 篇 elliptic curve c...

机构

  • 3 篇 brno university ...
  • 2 篇 kongu engn coll ...
  • 2 篇 erciyes univ kay...
  • 2 篇 govt coll engn d...
  • 2 篇 heilongjiang uni...
  • 2 篇 beijing univ pos...
  • 1 篇 univ ruse angel ...
  • 1 篇 department of co...
  • 1 篇 mil univ land fo...
  • 1 篇 michigan technol...
  • 1 篇 department of co...
  • 1 篇 kluvijayawada vi...
  • 1 篇 department of co...
  • 1 篇 anhui univ inst ...
  • 1 篇 nanchang univ de...
  • 1 篇 amrita sai inst ...
  • 1 篇 rajagiri sch eng...
  • 1 篇 miracle educ soc...
  • 1 篇 computation depa...
  • 1 篇 northcap univ ma...

作者

  • 4 篇 walter cd
  • 3 篇 karthikeyan n.
  • 3 篇 eldridge se
  • 2 篇 zhao yongli
  • 2 篇 grossschädl j
  • 2 篇 karatas zekeriya...
  • 2 篇 ding qun
  • 2 篇 zhang jie
  • 2 篇 sethi dimple
  • 2 篇 yuvaraju m.
  • 2 篇 shanthi s.
  • 2 篇 liu chenglian
  • 2 篇 luy erkam
  • 1 篇 yeh sheng lih
  • 1 篇 min h
  • 1 篇 zhi-yuan li
  • 1 篇 wang d. m.
  • 1 篇 boyd c
  • 1 篇 akhtar muhammad ...
  • 1 篇 genkin daniel

语言

  • 171 篇 英文
  • 10 篇 其他
  • 9 篇 中文
检索条件"主题词=RSA Algorithm"
190 条 记 录,以下是91-100 订阅
排序:
Enhancing the Security of Cloud Computing: Genetic algorithm and QR Code Approach  4
Enhancing the Security of Cloud Computing: Genetic Algorithm...
收藏 引用
4th International Conference on Advances in Electrical Engineering (ICAEE)
作者: Dey, Samrat Kumar Uddin, Md. Raihan Kabir, Kh. Mohaimenul Rahman, Md. Mahbubur Mil Inst Sci & Technol Dept Comp Sci & Engn Dhaka 1216 Bangladesh Daffodil Int Univ Dept Elect & Telecommun Engn 4-2 Sobhanbag Dhaka 1207 Bangladesh Dhaka Int Univ Dept Comp Sci & Engn 66 Green Rd Dhaka 1205 Bangladesh
Paradigms of Cloud computing are gaining prevalent acceptance due to the numerous benefits they provide. These comprise cost-effectiveness, time savings and effective deployment of computing resources. However, privac... 详细信息
来源: 评论
Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans  17
Measuring Popularity of Cryptographic Libraries in Internet-...
收藏 引用
33rd Annual Computer Security Applications Conference (ACSAC)
作者: Nemec, Matus Klinec, Dusan Svenda, Petr Sekan, Peter Matyas, Vashek Masaryk Univ Brno Czech Republic Ca Foscari Univ Venice Venice Italy EnigmaBridge Cambridge England
We measure the popularity of cryptographic libraries in large datasets of rsa public keys. We do so by improving a recently proposed method based on biases introduced by alternative implementations of prime selection ... 详细信息
来源: 评论
The Combination of rsa And Block Chiper algorithms To Maintain Message Authentication
The Combination of RSA And Block Chiper Algorithms To Mainta...
收藏 引用
International Conference on Information and Communication Technology (IconICT)
作者: Tarigan, Sepri Yanti Ginting, Dewi Sartika Gaol, Melva Lumban Sitompul, Kristin Lorensi Univ Sumatera Utara Informat Technol Medan Indonesia
rsa algorithm is public key algorithm using prime number and even still used today. The strength of this algorithm lies in the exponential process, and the factorial number into 2 prime numbers which until now difficu... 详细信息
来源: 评论
Integration of Fog and IoT model for the future Smart grid
Integration of Fog and IoT model for the future Smart grid
收藏 引用
International Conference on Emerging Trends in Computing and Communication Technologies (ICETCCT)
作者: Pant, Vishal Jain, Subhi Chauhan, Rahul Graph Era Univ Dept Comp Sci & Engn Dehra Dun Uttar Pradesh India Graph Era Hill Univ Dept Comp Sci & Engn Dehra Dun Uttar Pradesh India Graph Era Hill Univ Dept Elect & Commun Engn Dehra Dun Uttar Pradesh India
A modern power grid with smart devices, smart houses, smart meter, smart vehicle and transmission lines connected through a network constitute smart grid. Unlike the traditional structure of power grid, a smart grid p... 详细信息
来源: 评论
Enabling Enhanced Data Security for Aquaculture Management Services  3
Enabling Enhanced Data Security for Aquaculture Management S...
收藏 引用
3rd International Conference on Mobile and Secure Services (MobiSecServ)
作者: Piplani, Divya Sharma, Rahul Singh, Dinesh Kumar Aleembaig, M. Tata Consultancy Serv Ltd Innovat Lab Mumbai Bombay Maharashtra India
Aquaculture farmers and exporters usually face concerns related to data privacy and security of their farm data while using digital apps (Mobile Applications). Existing applications encrypt data by transmitting the ke... 详细信息
来源: 评论
Multipath Load Balancing and Secure Adaptive Routing Protocol for Service Oriented WSNs  5th
Multipath Load Balancing and Secure Adaptive Routing Protoco...
收藏 引用
5th International Conference on Frontiers in Intelligent Computing - Theory and Applications (FICTA)
作者: Anandkumar, C. P. Prasad, A. M. Suma, V. DSCE Dept CSE Bangalore Karnataka India DSCE RIIC Dept ISE Bangalore Karnataka India
Existing multipath routing methods in a Wireless Sensor Networks (WSNs) have presented the effective distribution of traffic over multipath to accomplish required quality of service (QOS). But, failure of the any link... 详细信息
来源: 评论
A Secure Method to Form Microgrids for Distribution Feeder Resiliency Improvement
A Secure Method to Form Microgrids for Distribution Feeder R...
收藏 引用
North American Power Symposium (NAPS)
作者: Abdelsalam, Hany A. Elashry, Ibrahim F. Kafrelshikh Univ Elect Power Engn Dept Kafrelshikh Egypt Kafrelshikh Univ Elect Commun Engn Dept Kafrelshikh Egypt
This paper introduces a method for distribution feeder resiliency improvement during emergency/disasters situations. Mixed integer linear programming (MILP) method solves the proposed optimization problem. Based on th... 详细信息
来源: 评论
Public Network Security by Bluffing the Intruders Through Encryption Over Encryption Using Public Key Cryptography Method  1st
Public Network Security by Bluffing the Intruders Through En...
收藏 引用
1st International Conference on Advanced Informatics for Computing Research (ICAICR)
作者: Madaan, Vishu Sethi, Dimple Agrawal, Prateek Jain, Leena Kaur, Ranjit Lovely Profess Univ Phagwara Punjab India Global Inst Management & Emerging Technol Amritsar Punjab India
Cryptography and network security is the concept of protecting the network and data transmission. Security of data is important, as data is transferred over unreliable network. Public-key cryptography provides optimal... 详细信息
来源: 评论
rsa Processor Design with Vedic Multiplier for Nodes in Wireless Sensor Networks  2
RSA Processor Design with Vedic Multiplier for Nodes in Wire...
收藏 引用
2nd IEEE International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)
作者: Leelavathi, G. Shaila, K. Venugopal, K. R. Vivekananda Inst Technol VTU Res Ctr Elect & Commun Engn Bengaluru India Univ Visvesvaraya Coll Engn Bengaluru India
Due to the resource constraints of Wireless Sensor Nodes the fast multipliers are essential for data processing. In this paper, we propose the rsa processor using Vedic multiplication technique that achieves considera... 详细信息
来源: 评论
Generalized rsa using 2k prime numbers with secure key generation
收藏 引用
SECURITY AND COMMUNICATION NETWORKS 2016年 第17期9卷 4443-4450页
作者: Lone, Auqib Hamid Khalique, Aqeel Jamia Hamdard Dept Comp Sci & Engn New Delhi India
Cryptography is used for secure communication since ancient days for providing confidentiality, integrity and availability of the information. Public key cryptography is a classification of cryptography having pair of... 详细信息
来源: 评论