咨询与建议

限定检索结果

文献类型

  • 101 篇 会议
  • 86 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 190 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 168 篇 工学
    • 110 篇 计算机科学与技术...
    • 67 篇 电气工程
    • 54 篇 信息与通信工程
    • 18 篇 电子科学与技术(可...
    • 18 篇 控制科学与工程
    • 17 篇 网络空间安全
    • 16 篇 软件工程
    • 8 篇 石油与天然气工程
    • 7 篇 仪器科学与技术
    • 7 篇 材料科学与工程(可...
    • 6 篇 机械工程
    • 5 篇 光学工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 力学(可授工学、理...
    • 1 篇 动力工程及工程热...
  • 39 篇 理学
    • 20 篇 数学
    • 17 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 化学
    • 1 篇 生物学
  • 20 篇 管理学
    • 11 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 4 篇 公共管理
  • 7 篇 医学
    • 4 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 2 篇 经济学
    • 1 篇 理论经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 190 篇 rsa algorithm
  • 36 篇 encryption
  • 30 篇 cryptography
  • 21 篇 decryption
  • 11 篇 security
  • 10 篇 public key
  • 9 篇 public key crypt...
  • 9 篇 private key
  • 8 篇 data security
  • 7 篇 cloud computing
  • 7 篇 fpga
  • 6 篇 modular multipli...
  • 6 篇 aes algorithm
  • 6 篇 steganography
  • 5 篇 image encryption
  • 5 篇 montgomery algor...
  • 5 篇 rsa
  • 5 篇 wireless sensor ...
  • 5 篇 digital signatur...
  • 4 篇 elliptic curve c...

机构

  • 3 篇 brno university ...
  • 2 篇 kongu engn coll ...
  • 2 篇 erciyes univ kay...
  • 2 篇 govt coll engn d...
  • 2 篇 heilongjiang uni...
  • 2 篇 beijing univ pos...
  • 1 篇 univ ruse angel ...
  • 1 篇 department of co...
  • 1 篇 mil univ land fo...
  • 1 篇 michigan technol...
  • 1 篇 department of co...
  • 1 篇 kluvijayawada vi...
  • 1 篇 department of co...
  • 1 篇 anhui univ inst ...
  • 1 篇 nanchang univ de...
  • 1 篇 amrita sai inst ...
  • 1 篇 rajagiri sch eng...
  • 1 篇 miracle educ soc...
  • 1 篇 computation depa...
  • 1 篇 northcap univ ma...

作者

  • 4 篇 walter cd
  • 3 篇 karthikeyan n.
  • 3 篇 eldridge se
  • 2 篇 zhao yongli
  • 2 篇 grossschädl j
  • 2 篇 karatas zekeriya...
  • 2 篇 ding qun
  • 2 篇 zhang jie
  • 2 篇 sethi dimple
  • 2 篇 yuvaraju m.
  • 2 篇 shanthi s.
  • 2 篇 liu chenglian
  • 2 篇 luy erkam
  • 1 篇 yeh sheng lih
  • 1 篇 min h
  • 1 篇 zhi-yuan li
  • 1 篇 wang d. m.
  • 1 篇 boyd c
  • 1 篇 akhtar muhammad ...
  • 1 篇 genkin daniel

语言

  • 171 篇 英文
  • 10 篇 其他
  • 9 篇 中文
检索条件"主题词=RSA Algorithm"
190 条 记 录,以下是51-60 订阅
排序:
Design of Data Security Transmission Scheme Based on Sharding Technology
Design of Data Security Transmission Scheme Based on Shardin...
收藏 引用
2023 International Conference on Evolutionary algorithms and Soft Computing Techniques, EASCT 2023
作者: Liu, Changtao Wan, Yitang Hua, Yunfeng Jiang, Yanbin Ye, Jun School of Cyberspace Security Hainan University Key Laboratory of Internet Information Retrieval of Hainan Province Haikou China
Data sharding technology is a method of dividing complete data into several slices to protect its security during transmission and reorganization. In order to further ensure the security of data and improve the robust... 详细信息
来源: 评论
Data Hiding Using PVD and Improving Security Using rsa
收藏 引用
JOURNAL OF APPLIED SECURITY RESEARCH 2022年 第3期17卷 413-420页
作者: Jeyaprakash, Hemalatha Kartheeban, Kamatchi Sahu, Aditya Kumar Chokkalingam, Balasubramanian AAA Coll Engn & Technol Dept CSE Sivakasi Tamil Nadu India KARE Dept CSE Krishnankoil Tamil Nadu India GMRIT Dept CSE Rajam Andhra Prades India
Steganography deals with hiding information, which offers ultimate security in defense, profitable usages, thus sending the imperceptible information, will not be bare or distinguished by others. In this paper, a mult... 详细信息
来源: 评论
Three-Tier approach to fortifying secure communication in Internet of vehicles networks
收藏 引用
AIN SHAMS ENGINEERING JOURNAL 2024年 第12期15卷
作者: Karthikeyan, N. Shanthi, S. Govt Coll Engn Dept Comp Sci & Engn Thanjavur Tamil Nadu India Kongu Engn Coll Dept Comp Sci & Engn Erode Tamil Nadu India
In the recent era, the high speed networking technologies plays a vital role in Internet of Vehicles (IoV) is increasingly prevalent in numerous real-time applications. In IoV network, the communication between differ... 详细信息
来源: 评论
Secure framework for IoT technology based on rsa and DNA cryptography
收藏 引用
EGYPTIAN JOURNAL OF MEDICAL HUMAN GENETICS 2022年 第1期23卷 1-7页
作者: Elamir, Mona M. Mabrouk, May S. Marzouk, Samir Y. Helwan Univ Biomed Engn Dept Cairo Egypt Misr Univ Sci & Technol Biomed Engn Dept Cairo Egypt Arab Acad Sci & Technol AASTMT Fac Engn Basic & Appl Sci Dept Cairo Egypt
Background The Internet of things (IoT) is the network of different objects or "things" containing sensors, software, and other technologies used to exchange data between devices and systems over the cloud. ... 详细信息
来源: 评论
Orbital Satellite Communication Encryption algorithm Based on Elliptic Curve Cryptography algorithm
收藏 引用
Procedia Computer Science 2025年 259卷 873-879页
作者: Haojie Yuan Yulu Wang Gang Tang China Software Testing Center (MIIT Software and Integrated Circuit Promotion Center) Beijing China China Mobile Information Technology Co. Ltd. Beijing China
In orbital satellite communication systems, there is a large amount of user sensitive data. In order to ensure the security of the data, but also to ensure the data transmission rate, the general use of symmetric encr... 详细信息
来源: 评论
Authentic secret share creation techniques using visual cryptography with public key encryption
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2021年 第21-23期80卷 32023-32040页
作者: Karolin, M. Meyyappan, T. Alagappa Univ Dept Comp Sci Karaikkudi Tamil Nadu India
In the digital transparent world, share the secret messages are challenged one. Visual cryptography (VC) is safer method for information transfer without any distraction by hackers. It is giving more security to the i... 详细信息
来源: 评论
The Difficulties and Decisions of Academic Misconduct in Information Forensics–A Case Study to Cryptographer
收藏 引用
Procedia Computer Science 2024年 238卷 882-887页
作者: Ruopengyu Xu Chenglian Liu Sonia Chien-I Chen Chunhua Cao Software Engineering Institute of Guangzhou Guangzhou 510990 China Qingdao University Qingdao 266061 China
Panda and Chattopadhyay proposed “A Hybrid algorithm for rsa Cryptosystem” in 2017, they modified well-known algorithm rsa into modulo four prime numbers. Later, Gondaliya, Savani, Dhaduvai and Hossain proposed “Hy... 详细信息
来源: 评论
A simplified scheme for secure offline electronic payment systems
收藏 引用
High-Confidence Computing 2021年 第2期1卷 26-34页
作者: Md.Abdullah Al Rahat Kutubi Kazi Md.Rokibul Alam Yasuhiko Morimoto Department of Computer Science and Engineering Khulna University of Engineering&TechnologyKhulna 9203Bangladesh Department of Computer Science and Engineering Bangladesh Army University of Engineering and TechnologyBangladesh Graduate School of Advanced Science and Engineering Hiroshima UniversityHigashi-Hiroshima 739-8521Japan
This paper proposes a secure offline electronic(e-)payment scheme by adopting Schnorr’s untraceable blind signature(BS).Thereby,to satisfy the essential security requirements of e-payment systems,it requires much mor... 详细信息
来源: 评论
Hybrid Image Encryption using Non-Adjacent Bits Dynamic Encoding DNA with rsa and Chaotic Systems
收藏 引用
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS 2023年 第9期14卷 607-620页
作者: Elmenyawi, Marwa A. Aziem, Nada M. Abdel Benha Univ Benha Fac Engn Banha Egypt Arab Acad Sci Technol & Maritime Transport Alexandria Egypt
Image encryption is a crucial aspect that helps to maintain the images' confidentiality and security in diverse applications. Ongoing research is focused on improving the efficiency and effectiveness of encryption... 详细信息
来源: 评论
Evolvable Hardware-Based Data Security System Using Image Steganography Through Dynamic Partial Reconfiguration
收藏 引用
JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS 2022年 第1期31卷 2250014-2250014页
作者: Krishna, B. Murali Santhosh, Chella Suman, Shruti Shireen, SK. Sadhiya Koneru Lakshmaiah Educ Fdn Dept Elect & Commun Engn Green Fields Guntur 522502 Andhra Pradesh India
A highly secure communication method is essential for end users for the exchange of information which is not interpreted by an intruder. Cryptography plays a crucial role in the current and upcoming digital worlds, fo... 详细信息
来源: 评论