咨询与建议

限定检索结果

文献类型

  • 101 篇 会议
  • 86 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 190 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 168 篇 工学
    • 110 篇 计算机科学与技术...
    • 67 篇 电气工程
    • 54 篇 信息与通信工程
    • 18 篇 电子科学与技术(可...
    • 18 篇 控制科学与工程
    • 17 篇 网络空间安全
    • 16 篇 软件工程
    • 8 篇 石油与天然气工程
    • 7 篇 仪器科学与技术
    • 7 篇 材料科学与工程(可...
    • 6 篇 机械工程
    • 5 篇 光学工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 力学(可授工学、理...
    • 1 篇 动力工程及工程热...
  • 39 篇 理学
    • 20 篇 数学
    • 17 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 化学
    • 1 篇 生物学
  • 20 篇 管理学
    • 11 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 4 篇 公共管理
  • 7 篇 医学
    • 4 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 2 篇 经济学
    • 1 篇 理论经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 190 篇 rsa algorithm
  • 36 篇 encryption
  • 30 篇 cryptography
  • 21 篇 decryption
  • 11 篇 security
  • 10 篇 public key
  • 9 篇 public key crypt...
  • 9 篇 private key
  • 8 篇 data security
  • 7 篇 cloud computing
  • 7 篇 fpga
  • 6 篇 modular multipli...
  • 6 篇 aes algorithm
  • 6 篇 steganography
  • 5 篇 image encryption
  • 5 篇 montgomery algor...
  • 5 篇 rsa
  • 5 篇 wireless sensor ...
  • 5 篇 digital signatur...
  • 4 篇 elliptic curve c...

机构

  • 3 篇 brno university ...
  • 2 篇 kongu engn coll ...
  • 2 篇 erciyes univ kay...
  • 2 篇 govt coll engn d...
  • 2 篇 heilongjiang uni...
  • 2 篇 beijing univ pos...
  • 1 篇 univ ruse angel ...
  • 1 篇 department of co...
  • 1 篇 mil univ land fo...
  • 1 篇 michigan technol...
  • 1 篇 department of co...
  • 1 篇 kluvijayawada vi...
  • 1 篇 department of co...
  • 1 篇 anhui univ inst ...
  • 1 篇 nanchang univ de...
  • 1 篇 amrita sai inst ...
  • 1 篇 rajagiri sch eng...
  • 1 篇 miracle educ soc...
  • 1 篇 computation depa...
  • 1 篇 northcap univ ma...

作者

  • 4 篇 walter cd
  • 3 篇 karthikeyan n.
  • 3 篇 eldridge se
  • 2 篇 zhao yongli
  • 2 篇 grossschädl j
  • 2 篇 karatas zekeriya...
  • 2 篇 ding qun
  • 2 篇 zhang jie
  • 2 篇 sethi dimple
  • 2 篇 yuvaraju m.
  • 2 篇 shanthi s.
  • 2 篇 liu chenglian
  • 2 篇 luy erkam
  • 1 篇 yeh sheng lih
  • 1 篇 min h
  • 1 篇 zhi-yuan li
  • 1 篇 wang d. m.
  • 1 篇 boyd c
  • 1 篇 akhtar muhammad ...
  • 1 篇 genkin daniel

语言

  • 171 篇 英文
  • 10 篇 其他
  • 9 篇 中文
检索条件"主题词=RSA Algorithm"
190 条 记 录,以下是121-130 订阅
排序:
An rsa-Like Scheme for Multiuser Broadcast Authentication in Wireless Sensor Networks
收藏 引用
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS 2015年 第9期11卷 1-11页
作者: Cheng, Chen-Yang Lin, Iuon-Chang Huang, Shu-Yan Natl Taipei Univ Technol Dept Ind Engn & Management Taipei 106 Taiwan Natl Chung Hsing Univ Dept Management Informat Syst Taichung 402 Taiwan Asia Univ Dept Photon & Commun Engn Taichung 413 Taiwan
For network users roaming in a wireless sensor network (WSN), they can broadcast queries to WSNs to obtain the latest sensed data from sensor nodes using their mobile devices. In such a scenario, each sensor node has ... 详细信息
来源: 评论
The design of the mobile phone module information encryption system based on FPGA
The design of the mobile phone module information encryption...
收藏 引用
2015 Fifth International Conference on Instrumentation and Measurement,Computer,Communication and Control (IMCCC2015)(第五届仪器测量、计算机通信与控制国际会议)
作者: Haoran Sun Qun Ding Electronic Engineering College Heilongjiang University Harbin China
Today's society is more and more tends to the development of information technology and the popularity of mobile phones also makes personal information security issues *** security transmission of mobile phone tex... 详细信息
来源: 评论
On Layered-Graph-Model-Based Routing and Spectrum Assignment in Elastic Optical Networks
On Layered-Graph-Model-Based Routing and Spectrum Assignment...
收藏 引用
IEEE Global Communications Conference
作者: Ching-Fang Hsu Yuan-Chih Chang Siou-Ci Sie Department of Computer Science National Cheng Kung University
The concept of elastic optical network (EON) has been proposed in recent years as a highly spectrum-efficient solution to implement flexible bandwidth channels. Just like the role of routing and wavelength assignment ... 详细信息
来源: 评论
Sprite:Security and Privacy for Cloud Storage
Sprite:Security and Privacy for Cloud Storage
收藏 引用
Int’l Conference on Computer Science, Data Mining & Mechanical Engg. (ICCDMME’2015, Thailand)
作者: Kyaw Thu Win the University of Compute Studies
Some organizations give storage services using cloud computing *** users of such services kept their data at third party *** this case,security and privacy concerns for cloud user data *** order to solve such concerns... 详细信息
来源: 评论
Hiding a Covert Digital Image by Assembling the rsa Encryption Method and the Binary Encoding Method
收藏 引用
MATHEMATICAL PROBLEMS IN ENGINEERING 2014年 第1期2014卷 1-8页
作者: Lin, Kuang Tsan Yeh, Sheng Lih St Johns Univ Dept Mech & Comp Aided Engn New Taipei City 25135 Taiwan Lunghwa Univ Sci & Technol Dept Mech Engn Kueishan 33306 Taoyuan County Taiwan
The Rivest-Shamir-Adleman (rsa) encryption method and the binary encoding method are assembled to form a hybrid hiding method to hide a covert digital image into a dot-matrix holographic image. First, the rsa encrypti... 详细信息
来源: 评论
IMPLEMENTATION OF VEDIC DIVIDER ON rsa CRYPTOSYSTEM
IMPLEMENTATION OF VEDIC DIVIDER ON RSA CRYPTOSYSTEM
收藏 引用
International Conference on Innovations in Information, Embedded and Communication Systems
作者: Jyotirmayee Subudhi C. Karthick Sathyabama University
rsa cryptosystem is an old and premier public key cryptography, which is used for data security. A divider is one of the key hardware blocks in most applications such as digital signal processing, cryptography and in ... 详细信息
来源: 评论
Efficient FPGA Implementation of rsa Coprocessor Using Scalable Modules
Efficient FPGA Implementation of RSA Coprocessor Using Scala...
收藏 引用
9th International Conference on Future Networks and Communications (FNC)
作者: Abu Al-Haija, Qasem Smadi, Mahmoud Al-Ja'fari, Monther Al-Shua'ibi, Abdullah King Faisal Univ Dept Elect Engn Al Hasa 31982 Saudi Arabia
rsa Cryptosystem is considered the first practicable secure algorithm that can be used to protect information during the communication. The significance of high security and efficient implementations of rsa have forme... 详细信息
来源: 评论
Secure Energy Efficient Load Balancing Multipath Routing Protocol with Power Management for Wireless Sensor Networks
Secure Energy Efficient Load Balancing Multipath Routing Pro...
收藏 引用
International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)
作者: Yuvaraju, M. Rani, K. Sheela Sobana Anna Univ Dept IMER Reg Ctr Coimbatore Tamil Nadu India Sri Ramakrishna Inst Technol Dept ECE Coimbatore Tamil Nadu India
Wired network nodes have direct connection with the power source. But wireless sensor nodes depend on the on-board battery for power. Two different things can be done to increase the operational lifetime of the WSN. F... 详细信息
来源: 评论
algorithmic Challenges in Flexible Optical Networks
Algorithmic Challenges in Flexible Optical Networks
收藏 引用
International Conference on Computing, Networking and Communications (ICNC)
作者: Varvarigos, E. A. Christodoulopoulos, K. Univ Patras Comp Engn & Informat Dept GR-26110 Patras Greece Comp Technol Inst & Press Diophantus Patras Greece
We discuss some basic algorithmic issues in flexible optical networks, highlighting the algorithmic challenges and differences to fixed-grid WDM networks and outline algorithms for planning and operating flexible opti... 详细信息
来源: 评论
Secret Communication using Public key Steganography
Secret Communication using Public key Steganography
收藏 引用
IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE)
作者: Mishra, Madhusudhan Tiwari, Gangadhar Yadav, Arun Kumar NERIST ECE Dept Itanagar AP India NIT IT Dept Durgapur W Bengal India MGIMT CSE Dept Lucknow Uttar Pradesh India
This paper introduces a new steganographic technique for secret data communication based on Public Key Digital Image steganography by combining public key cryptography with Digital Image Steganography. The proposed sc... 详细信息
来源: 评论