咨询与建议

限定检索结果

文献类型

  • 101 篇 会议
  • 86 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 190 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 168 篇 工学
    • 110 篇 计算机科学与技术...
    • 67 篇 电气工程
    • 54 篇 信息与通信工程
    • 18 篇 电子科学与技术(可...
    • 18 篇 控制科学与工程
    • 17 篇 网络空间安全
    • 16 篇 软件工程
    • 8 篇 石油与天然气工程
    • 7 篇 仪器科学与技术
    • 7 篇 材料科学与工程(可...
    • 6 篇 机械工程
    • 5 篇 光学工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 力学(可授工学、理...
    • 1 篇 动力工程及工程热...
  • 39 篇 理学
    • 20 篇 数学
    • 17 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 化学
    • 1 篇 生物学
  • 20 篇 管理学
    • 11 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 4 篇 公共管理
  • 7 篇 医学
    • 4 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 2 篇 经济学
    • 1 篇 理论经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 190 篇 rsa algorithm
  • 36 篇 encryption
  • 30 篇 cryptography
  • 21 篇 decryption
  • 11 篇 security
  • 10 篇 public key
  • 9 篇 public key crypt...
  • 9 篇 private key
  • 8 篇 data security
  • 7 篇 cloud computing
  • 7 篇 fpga
  • 6 篇 modular multipli...
  • 6 篇 aes algorithm
  • 6 篇 steganography
  • 5 篇 image encryption
  • 5 篇 montgomery algor...
  • 5 篇 rsa
  • 5 篇 wireless sensor ...
  • 5 篇 digital signatur...
  • 4 篇 elliptic curve c...

机构

  • 3 篇 brno university ...
  • 2 篇 kongu engn coll ...
  • 2 篇 erciyes univ kay...
  • 2 篇 govt coll engn d...
  • 2 篇 heilongjiang uni...
  • 2 篇 beijing univ pos...
  • 1 篇 univ ruse angel ...
  • 1 篇 department of co...
  • 1 篇 mil univ land fo...
  • 1 篇 michigan technol...
  • 1 篇 department of co...
  • 1 篇 kluvijayawada vi...
  • 1 篇 department of co...
  • 1 篇 anhui univ inst ...
  • 1 篇 nanchang univ de...
  • 1 篇 amrita sai inst ...
  • 1 篇 rajagiri sch eng...
  • 1 篇 miracle educ soc...
  • 1 篇 computation depa...
  • 1 篇 northcap univ ma...

作者

  • 4 篇 walter cd
  • 3 篇 karthikeyan n.
  • 3 篇 eldridge se
  • 2 篇 zhao yongli
  • 2 篇 grossschädl j
  • 2 篇 karatas zekeriya...
  • 2 篇 ding qun
  • 2 篇 zhang jie
  • 2 篇 sethi dimple
  • 2 篇 yuvaraju m.
  • 2 篇 shanthi s.
  • 2 篇 liu chenglian
  • 2 篇 luy erkam
  • 1 篇 yeh sheng lih
  • 1 篇 min h
  • 1 篇 zhi-yuan li
  • 1 篇 wang d. m.
  • 1 篇 boyd c
  • 1 篇 akhtar muhammad ...
  • 1 篇 genkin daniel

语言

  • 171 篇 英文
  • 10 篇 其他
  • 9 篇 中文
检索条件"主题词=RSA Algorithm"
190 条 记 录,以下是101-110 订阅
排序:
Physical Key Extraction Attacks on PCs
收藏 引用
COMMUNICATIONS OF THE ACM 2016年 第6期59卷 70-79页
作者: Genkin, Daniel Pachmanov, Lev Pipman, Itamar Shamir, Adi Tromer, Eran Technion Israel Inst Technol Dept Comp Sci IL-32000 Haifa Israel Tel Aviv Univ Blavatnik Sch Comp Sci IL-69978 Tel Aviv Israel Weizmann Inst Sci Fac Math & Comp Sci IL-76100 Rehovot Israel
Computers broadcast their secrets via inadvertent physical emanations that are easily measured and exploited.
来源: 评论
Comment on "An Enhanced and Secured rsa Key Generation Scheme (ESRKGS)"
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2016年 30卷 1-+页
作者: Luy, Erkam Karatas, Zekeriya Y. Ergin, Huseyin Erciyes Univ Kayseri Turkey Tuskegee Univ Tuskegee AL 36088 USA Univ Alabama Tuscaloosa AL USA
In this article, we do the cryptanalysis of the Enhanced and Secured rsa Key Generation Scheme (ESRKGS) given in Thangavel et al. (2015). The authors claimed that ESRKGS is a highly secure and not easily breakable sch... 详细信息
来源: 评论
Secure Communication and Authentication Using Raspberry Pi  5
Secure Communication and Authentication Using Raspberry Pi
收藏 引用
5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)
作者: Kakar, Vidur VIT Univ Sch Elect Engn Vellore Tamil Nadu India
Secure communication and authentication are two very important factors when it comes to applications such as payments. Since payments involve critical information such as user account number, pin, balance, etc., it be... 详细信息
来源: 评论
rsa Implementation for Data Transmission Security in BEM Chairman E-Voting Android Based Application  1
RSA Implementation for Data Transmission Security in BEM Cha...
收藏 引用
1st International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE)
作者: Juniawan, Fransiskus Panca STMIK Atma Luhur Dept Informat Engn Jl Jend Sudirman Selindung Baru 33117 Pangkalpinang Indonesia
Voting is a process that should be do in terms of leadership. In case, voting still use conventional methods which are less effective in terms of cost, governance, and working time. The possibility of calculation erro... 详细信息
来源: 评论
Letter To Shape Encryption For Securing MANET Routing Protocols
Letter To Shape Encryption For Securing MANET Routing Protoc...
收藏 引用
7th IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)
作者: Maheswary, A. Baskar, S. VELTECH Univ Chennai Tamil Nadu India
Today we are enjoying the benefits of technology, particularly in the field of communication, in the form of anywhere and anytime communication. One of the causes for this achievement is building global computer netwo... 详细信息
来源: 评论
A New Approach for Secure Data Transmission
A New Approach for Secure Data Transmission
收藏 引用
IEEE International Conference on Circuit, Power and Computing Technologies (ICCPCT)
作者: Pranesh, R. Harish, V. Vigneshwaran, M. Manikandan, G. SASTRA Univ Sch Comp Thanjavur India
In the global networked world, there is a phenomenal growth in data transfer and sharing. Security plays a vital role in transmitting the private data over the communication medium which tends to be open and insecure.... 详细信息
来源: 评论
Visual Cryptography For Image Depend on rsa & AlGamal algorithms
Visual Cryptography For Image Depend on RSA & AlGamal Algori...
收藏 引用
Al-Sadiq International Conference on Multidisciplinary in IT and Communication Techniques Science and Applications (AIC-MITCSA)
作者: Kadhim, Alaa Mohamed, Rand Mahmoud Univ Technol Baghdad Dept Comp Sci Baghdad Iraq
Visual cryptography is proposed in 1994 by Naor and Shamir who introduced a simple but perfectly secure way that allows secret sharing without any complex cryptographic computation, which they termed as Visual Cryptog... 详细信息
来源: 评论
PData Security using rsa Encryption Combined with Image Steganography  1
PData Security using RSA Encryption Combined with Image Steg...
收藏 引用
1st India International Conference on Information Processing (IICIP)
作者: Mittal, Shubhi Arora, Shivika Jain, Rachna Bharati Vidyapeeths Coll Engn New Delhi India
The increasing usage and dependency on Internet has made security of data a priority and a reason of concern. Data on cloud contains all kinds of personal and professional information, and cloud communication opens th... 详细信息
来源: 评论
Visual Cryptography For Image Depend on rsa & AlGamal algorithms
Visual Cryptography For Image Depend on RSA & AlGamal Algori...
收藏 引用
Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications
作者: Alaa Kadhim Rand Mahmoud Mohamed Computer science department University of technology Baghdad Iraq
Visual cryptography is proposed in 1994 by Naor and Shamir who introduced a simple but perfectly secure way that allows secret sharing without any complex cryptographic computation, which they termed as Visual Cryptog... 详细信息
来源: 评论
An Enhanced and Secured rsa Key Generation Scheme (ESRKGS)
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2015年 第Feb.期20卷 3-10页
作者: Thangavel, M. Varalakshmi, P. Murrali, Mukund Nithya, K. Anna Univ Dept Informat Technol Madras 600044 Tamil Nadu India
Public-key cryptography can be claimed as the greatest and an excellent revolution in the field of cryptography. A public-key cryptosystem is used for both confidentiality and authentication. One such public-key crypt... 详细信息
来源: 评论