咨询与建议

限定检索结果

文献类型

  • 101 篇 会议
  • 86 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 190 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 168 篇 工学
    • 110 篇 计算机科学与技术...
    • 67 篇 电气工程
    • 54 篇 信息与通信工程
    • 18 篇 电子科学与技术(可...
    • 18 篇 控制科学与工程
    • 17 篇 网络空间安全
    • 16 篇 软件工程
    • 8 篇 石油与天然气工程
    • 7 篇 仪器科学与技术
    • 7 篇 材料科学与工程(可...
    • 6 篇 机械工程
    • 5 篇 光学工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 力学(可授工学、理...
    • 1 篇 动力工程及工程热...
  • 39 篇 理学
    • 20 篇 数学
    • 17 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 化学
    • 1 篇 生物学
  • 20 篇 管理学
    • 11 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 4 篇 公共管理
  • 7 篇 医学
    • 4 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 2 篇 经济学
    • 1 篇 理论经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 190 篇 rsa algorithm
  • 36 篇 encryption
  • 30 篇 cryptography
  • 21 篇 decryption
  • 11 篇 security
  • 10 篇 public key
  • 9 篇 public key crypt...
  • 9 篇 private key
  • 8 篇 data security
  • 7 篇 cloud computing
  • 7 篇 fpga
  • 6 篇 modular multipli...
  • 6 篇 aes algorithm
  • 6 篇 steganography
  • 5 篇 image encryption
  • 5 篇 montgomery algor...
  • 5 篇 rsa
  • 5 篇 wireless sensor ...
  • 5 篇 digital signatur...
  • 4 篇 elliptic curve c...

机构

  • 3 篇 brno university ...
  • 2 篇 kongu engn coll ...
  • 2 篇 erciyes univ kay...
  • 2 篇 govt coll engn d...
  • 2 篇 heilongjiang uni...
  • 2 篇 beijing univ pos...
  • 1 篇 univ ruse angel ...
  • 1 篇 department of co...
  • 1 篇 mil univ land fo...
  • 1 篇 michigan technol...
  • 1 篇 department of co...
  • 1 篇 kluvijayawada vi...
  • 1 篇 department of co...
  • 1 篇 anhui univ inst ...
  • 1 篇 nanchang univ de...
  • 1 篇 amrita sai inst ...
  • 1 篇 rajagiri sch eng...
  • 1 篇 miracle educ soc...
  • 1 篇 computation depa...
  • 1 篇 northcap univ ma...

作者

  • 4 篇 walter cd
  • 3 篇 karthikeyan n.
  • 3 篇 eldridge se
  • 2 篇 zhao yongli
  • 2 篇 grossschädl j
  • 2 篇 karatas zekeriya...
  • 2 篇 ding qun
  • 2 篇 zhang jie
  • 2 篇 sethi dimple
  • 2 篇 yuvaraju m.
  • 2 篇 shanthi s.
  • 2 篇 liu chenglian
  • 2 篇 luy erkam
  • 1 篇 yeh sheng lih
  • 1 篇 min h
  • 1 篇 zhi-yuan li
  • 1 篇 wang d. m.
  • 1 篇 boyd c
  • 1 篇 akhtar muhammad ...
  • 1 篇 genkin daniel

语言

  • 171 篇 英文
  • 10 篇 其他
  • 9 篇 中文
检索条件"主题词=RSA Algorithm"
190 条 记 录,以下是21-30 订阅
排序:
Chaotic System Image Encryption algorithm Base rsa  1
收藏 引用
13th International Conference on Computer Engineering and Networks (CENet)
作者: Zhao, Fuzhe Guo, Junnan Xu, Han Cent China Normal Univ Sch Comp Wuhan Peoples R China
Aiming at the limitation of one-dimensional Chebyshev chaotic map, an improved two-dimensional Chebyshev chaotic map is proposed. This map makes its structure more complex by extending the original one-dimensional map... 详细信息
来源: 评论
A Modified Technique for Reliable Image Encryption Method using Merkle-Hellman Cryptosystem and rsa algorithm
收藏 引用
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY 2015年 第3期18卷 293-300页
作者: Lokeshwari, G. Susarla, Sreevidya Kumar, S. Udaya Geethanjali Coll Engn & Technol CSE Dept Cheeryal Keesara India Chaitanya Bharathi Inst Technol Comp Sci & Engn Hyderabad Andhra Pradesh India Geethanjali Coll Engn & Technol Cheeryal Keesara India
The great advances in digital data communication have led to high desire for a secured and reliable transmission. Advances in satellite communication like packet radio technology and the development of high speed LAN&... 详细信息
来源: 评论
The Application of rsa Encryption algorithm in the Hainan Rural Tourism Management Platform
The Application of RSA Encryption Algorithm in the Hainan Ru...
收藏 引用
2017 2nd International Conference on Education,Sports,Arts and Management Engineering(ICESAME 2017)
作者: Huijuan Xie Hainan College of Economics and Business
With the development of information technology, such as Big Data, O2O, Cloud Computing, the Internet of Things and Artificial Intelligence, the Hainan Rural Tourism Wisdom Management Platform should provide complete, ... 详细信息
来源: 评论
An Information Fusion approach based on prime numbers coming from rsa algorithm and Fractals for secure coding
收藏 引用
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY 2015年 第5期18卷 455-479页
作者: Iovane, G. Amorosia, A. Benedetto, E. Lamponi, G. Univ Salerno Dipartimento Informat Salerno Italy Univ Salerno Salerno Italy Univ Messina Messina Italy
In the present paper we will show a system to realize an innovative cryptographic code that ensures a high level of security using Information Fusion (IF) techniques. In detail, we have decided to merge two codes resp... 详细信息
来源: 评论
DES-Co-rsa: A Hybrid Encryption algorithm Based on des and rsa  3
DES-Co-RSA: A Hybrid Encryption Algorithm Based on des and R...
收藏 引用
3rd IEEE International Conference on Power, Electronics and Computer Applications, ICPECA 2023
作者: Zhao, Jingjing North China Electric Power University Department of Computer Science and Engineering Baoding China
The Internet is developing rapidly, which leads to a sharp increase in information transmitted by the network. Moreover, people have a higher demand for encrypting meetings and encrypting information transmission. Cur... 详细信息
来源: 评论
S-box using fractional-order 4D hyperchaotic system and its application to rsa cryptosystem-based color image encryption
收藏 引用
COMPUTER STANDARDS & INTERFACES 2025年 93卷
作者: Ullah, Saeed Liu, Xinge Waheed, Adil China, Shuailei Zhang Cent South Univ Sch Math & Stat Changsha 410083 Hunan Peoples R China Univ Educ Dept Informat Sci Div Sci & Technol Lahore 54770 Pakistan
An algorithm for substitution box (S-box) construction is proposed by using fractional-order (FO) 4D hyperchaotic system in this paper. Based on hyperchaotic sequences generated by the FO 4D hyperchaotic system, exclu... 详细信息
来源: 评论
A Comprehensive Analysis of Cryptographic algorithms: Evaluating Security, Efficiency, and Future Challenges
收藏 引用
IEEE ACCESS 2025年 13卷 11576-11593页
作者: Ramakrishna, Donagani Shaik, Mohammed Ali SR Univ Warangal 506371 Telangana India
Cryptographic techniques are reviewed in this literature review, with particular attention paid to their applicability, importance, contributions, and field strengths. These algorithms include DES, 3DES, AES, blowfish... 详细信息
来源: 评论
Enhancing Data Security in IoV Communications Through Triplet Layered Approach
收藏 引用
IETE JOURNAL OF RESEARCH 2025年
作者: Karthikeyan, N. Shanthi, S. Govt Coll Engn Dept Comp Sci & Engn Thanjavur Tamil Nadu India Kongu Engn Coll Dept Comp Sci & Engn Erode Tamil Nadu India
Recent innovations in cloud computing and the Internet of Things (IoT) have reshaped numerous real-time applications. However, the exchange of sensitive information within these systems requires strong security measur... 详细信息
来源: 评论
A Review of Image Steganography Based on Multiple Hashing algorithm
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 2463-2494页
作者: Abdullah Alenizi Mohammad Sajid Mohammadi Ahmad A.Al-Hajji Arshiya Sajid Ansari Department of Information Technology College of Computer and Information SciencesMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Computer Science College of Engineering and Information TechnologyOnaizah CollegesQassim56312Saudi Arabia
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover *** ancient times to the present,the security of secret or vital information has always been a signifi... 详细信息
来源: 评论
A Study of Cryptographic algorithms on Special Linear Group Over Ring of Integers Modulo m
收藏 引用
IEEE ACCESS 2025年 13卷 5606-5617页
作者: Lipinski, Zbigniew Mizera-Pietraszko, Jolanta Tancula, Jolanta Univ Opole Dept Math Phys & Comp Sci PL-45052 Opole Poland Mil Univ Land Forces Dept Res Methodol PL-51147 Wroclaw Poland
Despite the development of numerous cryptographic algorithms over the last decade to ensure greater security for the users, the cyberattack forms are still advancing, which creates a challenge for the research communi... 详细信息
来源: 评论