咨询与建议

限定检索结果

文献类型

  • 101 篇 会议
  • 86 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 190 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 168 篇 工学
    • 110 篇 计算机科学与技术...
    • 67 篇 电气工程
    • 54 篇 信息与通信工程
    • 18 篇 电子科学与技术(可...
    • 18 篇 控制科学与工程
    • 17 篇 网络空间安全
    • 16 篇 软件工程
    • 8 篇 石油与天然气工程
    • 7 篇 仪器科学与技术
    • 7 篇 材料科学与工程(可...
    • 6 篇 机械工程
    • 5 篇 光学工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 力学(可授工学、理...
    • 1 篇 动力工程及工程热...
  • 39 篇 理学
    • 20 篇 数学
    • 17 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 化学
    • 1 篇 生物学
  • 20 篇 管理学
    • 11 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 4 篇 公共管理
  • 7 篇 医学
    • 4 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 2 篇 经济学
    • 1 篇 理论经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 190 篇 rsa algorithm
  • 36 篇 encryption
  • 30 篇 cryptography
  • 21 篇 decryption
  • 11 篇 security
  • 10 篇 public key
  • 9 篇 public key crypt...
  • 9 篇 private key
  • 8 篇 data security
  • 7 篇 cloud computing
  • 7 篇 fpga
  • 6 篇 modular multipli...
  • 6 篇 aes algorithm
  • 6 篇 steganography
  • 5 篇 image encryption
  • 5 篇 montgomery algor...
  • 5 篇 rsa
  • 5 篇 wireless sensor ...
  • 5 篇 digital signatur...
  • 4 篇 elliptic curve c...

机构

  • 3 篇 brno university ...
  • 2 篇 kongu engn coll ...
  • 2 篇 erciyes univ kay...
  • 2 篇 govt coll engn d...
  • 2 篇 heilongjiang uni...
  • 2 篇 beijing univ pos...
  • 1 篇 univ ruse angel ...
  • 1 篇 department of co...
  • 1 篇 mil univ land fo...
  • 1 篇 michigan technol...
  • 1 篇 department of co...
  • 1 篇 kluvijayawada vi...
  • 1 篇 department of co...
  • 1 篇 anhui univ inst ...
  • 1 篇 nanchang univ de...
  • 1 篇 amrita sai inst ...
  • 1 篇 rajagiri sch eng...
  • 1 篇 miracle educ soc...
  • 1 篇 computation depa...
  • 1 篇 northcap univ ma...

作者

  • 4 篇 walter cd
  • 3 篇 karthikeyan n.
  • 3 篇 eldridge se
  • 2 篇 zhao yongli
  • 2 篇 grossschädl j
  • 2 篇 karatas zekeriya...
  • 2 篇 ding qun
  • 2 篇 zhang jie
  • 2 篇 sethi dimple
  • 2 篇 yuvaraju m.
  • 2 篇 shanthi s.
  • 2 篇 liu chenglian
  • 2 篇 luy erkam
  • 1 篇 yeh sheng lih
  • 1 篇 min h
  • 1 篇 zhi-yuan li
  • 1 篇 wang d. m.
  • 1 篇 boyd c
  • 1 篇 akhtar muhammad ...
  • 1 篇 genkin daniel

语言

  • 171 篇 英文
  • 10 篇 其他
  • 9 篇 中文
检索条件"主题词=RSA Algorithm"
190 条 记 录,以下是131-140 订阅
排序:
Effective Watermarking of Digital Audio and Image using Matlab Technique
Effective Watermarking of Digital Audio and Image using Matl...
收藏 引用
2nd International Conference on Machine Vision
作者: Subbarayan, Sadasivam Ramanathan, S. Karthick Laureate Int Univ Fac Engn & Technol INTI Univ Coll Nilai Malaysia
Watermarking is a technique which allows an individual to add hidden copyright notices or other verification messages to digital audio, video, or image signals and documents. In our proposal, for Audio Watermarking, a... 详细信息
来源: 评论
Security Analysis of Concast and Anycast Digital Signature
Security Analysis of Concast and Anycast Digital Signature
收藏 引用
2nd International Conference on Frontiers of Manufacturing and Design Science (ICFMD 2011)
作者: Liu, Chenglian Guo, Yongning Fujian Normal Univ Dept Math & Comp Sci Fuqing Branch Fuqing 350300 Peoples R China
In the above paper a conception has been proposed which is a variant of the ElGamal-type digital signature. It considers the problem of authentication in the concast and anycast communication model. This paper propose... 详细信息
来源: 评论
High-speed rsa hardware based on Barret's modular reduction method  2nd
High-speed RSA hardware based on Barret's modular reduction ...
收藏 引用
2nd International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2000)
作者: Grossschädl, J Graz Univ Technol Inst Appl Informat Proc & Commun A-8010 Graz Austria
The performance of public-key cryptosystems like the rsa encryption scheme or the Diffie-Hellman key agreement scheme is primarily determined by an efficient implementation of the modular arithmetic. This paper presen... 详细信息
来源: 评论
Error prevention, detection and diffusion algorithms for cryptographic hardware
Error prevention, detection and diffusion algorithms for cry...
收藏 引用
International Conference on Dependability of Computer Systems
作者: Nikodem, Maciej Wroclaw Univ Tehcnol Inst Comp Engn Control & Robot Wroclaw Poland
It is well known that hardware is susceptible to variety of different faults causing device malfunction, errors in the output or simply destroying the device. These threats refer to any type of hardware. However in ca... 详细信息
来源: 评论
Development of a New algorithm Based on SVD for Image Watermarking  1
收藏 引用
International Conference on Computational Vision and Robotics (ICCVR)
作者: Ray, Arun Kumar Padhihary, Sabyasachi Patra, Prasanta Kumar Mohanty, Mihir Narayan KIIT Univ Sch Elect Engn Bhubaneswar Odisha India SOA Univ Sch Elect Engn ITER Bhubaneswar Odisha India
The research on watermarking has been increasing day-by-day since past decade. It has been largely driven by its important applications in digital copyrights management and protection. To provide more watermarks and t... 详细信息
来源: 评论
SYSTOLIC MODULAR MULTIPLICATION
收藏 引用
IEEE TRANSACTIONS ON COMPUTERS 1993年 第3期42卷 376-378页
作者: WALTER, CD Comput. Dept. Univ. of Manchester Inst. of Sci. & Technol. UK Abstract Authors References Cited By Keywords Metrics Similar Download Citation Email Print Request Permissions n+ cycles for multiplicands having ..." property="og:description">
A systolic array for modular multiplication is presented using the ideally suited algorithm of P. L. Montgomery. Throughput is one modular multiplication every clock cycle, with a latency of 2n + 2 cycles for multipli... 详细信息
来源: 评论
Computation and communication efficient secure group key exchange protocol for low configuration system
收藏 引用
International Journal of Information Technology (Singapore) 2021年 第3期13卷 839-843页
作者: Rawat, Arjun Singh Deshmukh, Maroti Department of Computer Science and Engineering National Institute of Technology Uttarakhand Srinagar Uttarakhand India
The group key exchange protocol is a cryptographic mechanism is designed to provide a common session key for a group, there are some common challenges to this type of algorithm as computation and communication cost. W... 详细信息
来源: 评论
Battlefield Health Surveillance with Soldier Tracking: A Privacy-Preserving Encrypted Approach
Battlefield Health Surveillance with Soldier Tracking: A Pri...
收藏 引用
2023 International Conference on Advances in Computation, Communication and Information Technology, ICAICCIT 2023
作者: Ingale, Kiran Vaze, Sanaya Uttarwar, Varad Urane, Samarth Thosar, Samarth Mahajan, Tavishi Vishwakarma Institute of Technology Department of Multidisciplinary Engineering Pune India Vishwakarma Institute of Technology Department of Computer Engineering Pune India
In this paper, a system is designed and implemented, keeping in mind the safety and efficiency of the soldiers. The system will monitor various vital signs of the soldier to ensure his safety and will also help him to... 详细信息
来源: 评论
A New Approach for Secure Data Transmission
A New Approach for Secure Data Transmission
收藏 引用
IEEE International Conference on Circuit, Power and Computing Technologies (ICCPCT)
作者: Pranesh, R. Harish, V. Vigneshwaran, M. Manikandan, G. SASTRA Univ Sch Comp Thanjavur India
In the global networked world, there is a phenomenal growth in data transfer and sharing. Security plays a vital role in transmitting the private data over the communication medium which tends to be open and insecure.... 详细信息
来源: 评论
Securing Medical Images for Mobile Health Systems Using a Combined Approach of Encryption and Steganography  14th
Securing Medical Images for Mobile Health Systems Using a Co...
收藏 引用
14th International Conference on Intelligent Computing (ICIC)
作者: Jiang, Tao Zhang, Kai Tang, Jinshan Wuhan Univ Sci & Technol Coll Comp Sci & Technol Wuhan 430065 Hubei Peoples R China Michigan Technol Univ Sch Technol Houghton MI 49931 USA
In this paper, we propose a medical image encryption scheme which can be used in mobile health systems. The proposed scheme combines rsa algorithm, logistic chaotic encryption algorithm, and steganography technique to... 详细信息
来源: 评论