咨询与建议

限定检索结果

文献类型

  • 101 篇 会议
  • 86 篇 期刊文献

馆藏范围

  • 187 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 168 篇 工学
    • 110 篇 计算机科学与技术...
    • 67 篇 电气工程
    • 54 篇 信息与通信工程
    • 18 篇 电子科学与技术(可...
    • 18 篇 控制科学与工程
    • 17 篇 网络空间安全
    • 16 篇 软件工程
    • 8 篇 石油与天然气工程
    • 7 篇 仪器科学与技术
    • 7 篇 材料科学与工程(可...
    • 6 篇 机械工程
    • 5 篇 光学工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 力学(可授工学、理...
    • 1 篇 动力工程及工程热...
  • 39 篇 理学
    • 20 篇 数学
    • 17 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 化学
    • 1 篇 生物学
  • 20 篇 管理学
    • 11 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 4 篇 公共管理
  • 7 篇 医学
    • 4 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 2 篇 经济学
    • 1 篇 理论经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 187 篇 rsa algorithm
  • 36 篇 encryption
  • 28 篇 cryptography
  • 21 篇 decryption
  • 11 篇 security
  • 10 篇 public key
  • 9 篇 public key crypt...
  • 9 篇 private key
  • 8 篇 data security
  • 7 篇 cloud computing
  • 7 篇 fpga
  • 6 篇 modular multipli...
  • 6 篇 aes algorithm
  • 6 篇 steganography
  • 5 篇 image encryption
  • 5 篇 montgomery algor...
  • 5 篇 rsa
  • 5 篇 wireless sensor ...
  • 5 篇 digital signatur...
  • 4 篇 elliptic curve c...

机构

  • 2 篇 kongu engn coll ...
  • 2 篇 erciyes univ kay...
  • 2 篇 govt coll engn d...
  • 2 篇 heilongjiang uni...
  • 2 篇 beijing univ pos...
  • 1 篇 univ ruse angel ...
  • 1 篇 department of co...
  • 1 篇 mil univ land fo...
  • 1 篇 michigan technol...
  • 1 篇 department of co...
  • 1 篇 kluvijayawada vi...
  • 1 篇 department of co...
  • 1 篇 anhui univ inst ...
  • 1 篇 nanchang univ de...
  • 1 篇 amrita sai inst ...
  • 1 篇 rajagiri sch eng...
  • 1 篇 miracle educ soc...
  • 1 篇 computation depa...
  • 1 篇 northcap univ ma...
  • 1 篇 hohai univ coll ...

作者

  • 4 篇 walter cd
  • 3 篇 karthikeyan n.
  • 3 篇 eldridge se
  • 2 篇 zhao yongli
  • 2 篇 grossschädl j
  • 2 篇 karatas zekeriya...
  • 2 篇 ding qun
  • 2 篇 zhang jie
  • 2 篇 sethi dimple
  • 2 篇 yuvaraju m.
  • 2 篇 shanthi s.
  • 2 篇 liu chenglian
  • 2 篇 luy erkam
  • 1 篇 yeh sheng lih
  • 1 篇 min h
  • 1 篇 zhi-yuan li
  • 1 篇 wang d. m.
  • 1 篇 boyd c
  • 1 篇 akhtar muhammad ...
  • 1 篇 genkin daniel

语言

  • 168 篇 英文
  • 10 篇 其他
  • 9 篇 中文
检索条件"主题词=RSA Algorithm"
187 条 记 录,以下是31-40 订阅
排序:
A Study of Cryptographic algorithms on Special Linear Group Over Ring of Integers Modulo m
收藏 引用
IEEE ACCESS 2025年 13卷 5606-5617页
作者: Lipinski, Zbigniew Mizera-Pietraszko, Jolanta Tancula, Jolanta Univ Opole Dept Math Phys & Comp Sci PL-45052 Opole Poland Mil Univ Land Forces Dept Res Methodol PL-51147 Wroclaw Poland
Despite the development of numerous cryptographic algorithms over the last decade to ensure greater security for the users, the cyberattack forms are still advancing, which creates a challenge for the research communi... 详细信息
来源: 评论
Fuzzy logic and CPSO-optimized key management for secure communication in decentralized IoT networks: A lightweight solution
收藏 引用
PEER-TO-PEER NETWORKING AND APPLICATIONS 2024年 第5期17卷 2979-2997页
作者: Vellingiri, J. Vedhavathy, T. R. Pandi, S. Senthil Subramanian, C. Bala Vellore Inst Technol Sch Comp Sci Engn & Informat Syst Dept Softwae & Syst Engn Vellore Tamil Nadu India SRM Inst Sci & Technol Sch Comp Dept Networking & Commun Chennai 603203 India Rajalakshmi Engn Coll Dept Comp Sci & Engn Chennai Tamil Nadu India Kalasalingam Acad Res & Educ Dept Comp Sci Engn Anand Nagar Krishnankoil Tamil Nadu India
The act of implementing specific measures to ensure the security of cryptographic keys within an organization is referred to as key management. Securing communication in a decentralized IoT network presents many chall... 详细信息
来源: 评论
CYBERGUARD: A FORTIFIED MESSAGE AUTHENTICATION PROTOCOL WITH DIGITAL SIGNATURES IN NS-2 SIMULATION ENVIRONMENT
收藏 引用
SCALABLE COMPUTING-PRACTICE AND EXPERIENCE 2025年 第1期26卷 114-122页
作者: Kumar, Prashant Sethi, Dimple Shrivastava, Gulshan Srivastava, Neeraj Bennett Univ SCSET Times Grp Plot 8-11TechZone 2 Greater Noida 201310 Uttar Pradesh India Agra Coll Dept Math Agra 282001 Uttar Pradesh India
Delving into the dynamic realm of communication networks, the Network Simulator-2 (NS-2) emerges as a versatile, object-oriented, and event-driven mirror, analysing the intricacies of computer network. NS-2, an open-s... 详细信息
来源: 评论
Comment on "An enhanced and secured rsa public cryptosystem algorithm using Chinese remainder theorem (ESRPKC)"
收藏 引用
INFORMATION PROCESSING LETTERS 2022年 177卷
作者: Luy, Erkam Karatas, Zekeriya Y. Ciftci, Olcay Erciyes Univ Kayseri Turkey Univ Cincinnati Blue Ash Coll Blue Ash OH 45236 USA Auburn Univ Auburn AL 36849 USA
In [1], Kumar et al. proposed an enhanced and secured rsa public key cryptosystem (ESRPKC) algorithm using Chinese remainder theorem. In their scheme, the public key is defined as (N, e, mu) where N is the product of ... 详细信息
来源: 评论
Modified Adhoc On-Demand Distance Vector for Trust Evaluation And Attack Detection
收藏 引用
Intelligent Automation & Soft Computing 2023年 第5期36卷 1227-1240页
作者: S.Soundararajan B.R.Tapas Bapu C.Kotteeswaran S.Venkatasubramanian P.J.Sathish Kumar Ahmed Mudassar Ali Anna University Chennai600025Tamil NaduIndia S.A.Engineering College VeeraraghavapChennai600077Tamil NaduIndia Saranathan College of Engineering Trichy620019Tamil NaduIndia Panimalar Engineering College Chennai600069TamilnaduIndia
Recently,Wireless Sensor Network(WSN)becomes most potential technologies for providing improved services to several data gathering and track-ing *** of the wireless medium,multi-hop communication,absence of physical p... 详细信息
来源: 评论
Med-tech device security through advanced server cryptography
收藏 引用
International Journal of Information Technology (Singapore) 2025年 第2期17卷 1015-1022页
作者: Sharan, Preeta Yasmeen, M.S. Nagesh, N. Parimi, Pranav Chetan, V. Roy, Sandip Kumar Department of Electronics and Communication (R & D) The Oxford College of Engineering Bangalore India Department of Electronics and Communication Engineering The Oxford College of Engineering Bangalore India Department of Computer Science Engineering Amrita Vishwa Vidyapeetham Bangalore India Research and Development The Oxford College of Engineering Bangalore India S P Jain School of Global Management Dubai United Arab Emirates
To protect secrecy without compromising data, the study outlines a strong security framework for communications between mobile devices and servers and recommends encryption as the best option. Traditional encryption t... 详细信息
来源: 评论
A Secure Method for Data Storage and Transmission in Sustainable Cloud Computing
收藏 引用
Computers, Materials & Continua 2023年 第5期75卷 2741-2757页
作者: Muhammad Usman Sana Zhanli Li Tayybah Kiren Hannan Bin Liaqat Shahid Naseem Atif Saeed College of Computer Science and Technology Xi’an University of Science and TechnologyXi’anShaanxi710054China Department of Computer Science(RCET Campus) University of Engineering and TechnologyLahore39161Pakistan Department of Information Sciences Division of Science&TechnologyUniversity of EducationLahore54700Pakistan Department of Computer Science COMSATS UniversityIslamabadLahore54700Pakistan
Cloud computing is a technology that provides secure storage space for the customer’s massive data and gives them the facility to retrieve and transmit their data efficiently through a secure network in which encrypt... 详细信息
来源: 评论
Developing Web-Based Application for QR Code Digital Signatures using OpenSSL  26
Developing Web-Based Application for QR Code Digital Signatu...
收藏 引用
26th International Electronics Symposium (IES) on Shaping the Future - Society 5.0 and Beyond
作者: Muzakkir, Fariz Bagaskoro Darwito, Haryadi Amran Yuliana, Mike Politekn Elekt Negeri Surabaya Dept Elect Engn Surabaya Indonesia
Despite advancements in technology, many work-related activities still require signature verification. Digital signature technology offers a suitable solution that can be implemented through information technology. Th... 详细信息
来源: 评论
A hybrid algorithm-based optimization protocol to ensure data security in the cloud
收藏 引用
International Journal of Information Technology (Singapore) 2024年 第5期16卷 3057-3064页
作者: Zubair, Swaleha Ahmed, Haitham M. A. Department of Computer Science Aligarh Muslim University UP Aligarh India
Cloud computing security involves the procedures, technologies, and policies that protect data, applications, and resources in cloud computing environments. As communities increasingly rely on cloud services for compu... 详细信息
来源: 评论
The quantum computer for accelerating image processing and strengthening the security of information systems
收藏 引用
CHINESE JOURNAL OF PHYSICS 2023年 81卷 104-124页
作者: Nouioua, Tarek Belbachir, Ahmed Hafid Univ Tebessa Fac Exact Sci & Sci Nat & life Dept Math & Comp Sci Tebessa Algeria Univ Sci & Technol Oran Mohamed Boudiaf Fac Phys Engn Phys Dept Lab Anal & Applicat Radiat LAAR Bir El Djir Algeria
Many researchers and laboratories have been involved for many years in the development of the quantum computer. In 2019, Google has announced that they have reached quantum supremacy with their quantum computer Sycamo... 详细信息
来源: 评论