咨询与建议

限定检索结果

文献类型

  • 101 篇 会议
  • 86 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 190 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 168 篇 工学
    • 110 篇 计算机科学与技术...
    • 67 篇 电气工程
    • 54 篇 信息与通信工程
    • 18 篇 电子科学与技术(可...
    • 18 篇 控制科学与工程
    • 17 篇 网络空间安全
    • 16 篇 软件工程
    • 8 篇 石油与天然气工程
    • 7 篇 仪器科学与技术
    • 7 篇 材料科学与工程(可...
    • 6 篇 机械工程
    • 5 篇 光学工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 力学(可授工学、理...
    • 1 篇 动力工程及工程热...
  • 39 篇 理学
    • 20 篇 数学
    • 17 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 化学
    • 1 篇 生物学
  • 20 篇 管理学
    • 11 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 4 篇 公共管理
  • 7 篇 医学
    • 4 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 2 篇 经济学
    • 1 篇 理论经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 190 篇 rsa algorithm
  • 36 篇 encryption
  • 30 篇 cryptography
  • 21 篇 decryption
  • 11 篇 security
  • 10 篇 public key
  • 9 篇 public key crypt...
  • 9 篇 private key
  • 8 篇 data security
  • 7 篇 cloud computing
  • 7 篇 fpga
  • 6 篇 modular multipli...
  • 6 篇 aes algorithm
  • 6 篇 steganography
  • 5 篇 image encryption
  • 5 篇 montgomery algor...
  • 5 篇 rsa
  • 5 篇 wireless sensor ...
  • 5 篇 digital signatur...
  • 4 篇 elliptic curve c...

机构

  • 3 篇 brno university ...
  • 2 篇 kongu engn coll ...
  • 2 篇 erciyes univ kay...
  • 2 篇 govt coll engn d...
  • 2 篇 heilongjiang uni...
  • 2 篇 beijing univ pos...
  • 1 篇 univ ruse angel ...
  • 1 篇 department of co...
  • 1 篇 mil univ land fo...
  • 1 篇 michigan technol...
  • 1 篇 department of co...
  • 1 篇 kluvijayawada vi...
  • 1 篇 department of co...
  • 1 篇 anhui univ inst ...
  • 1 篇 nanchang univ de...
  • 1 篇 amrita sai inst ...
  • 1 篇 rajagiri sch eng...
  • 1 篇 miracle educ soc...
  • 1 篇 computation depa...
  • 1 篇 northcap univ ma...

作者

  • 4 篇 walter cd
  • 3 篇 karthikeyan n.
  • 3 篇 eldridge se
  • 2 篇 zhao yongli
  • 2 篇 grossschädl j
  • 2 篇 karatas zekeriya...
  • 2 篇 ding qun
  • 2 篇 zhang jie
  • 2 篇 sethi dimple
  • 2 篇 yuvaraju m.
  • 2 篇 shanthi s.
  • 2 篇 liu chenglian
  • 2 篇 luy erkam
  • 1 篇 yeh sheng lih
  • 1 篇 min h
  • 1 篇 zhi-yuan li
  • 1 篇 wang d. m.
  • 1 篇 boyd c
  • 1 篇 akhtar muhammad ...
  • 1 篇 genkin daniel

语言

  • 171 篇 英文
  • 10 篇 其他
  • 9 篇 中文
检索条件"主题词=RSA Algorithm"
190 条 记 录,以下是61-70 订阅
排序:
Robust and Hybrid Crypto-watermarking Approach for 3D Multiresolution Meshes Security  16
Robust and Hybrid Crypto-watermarking Approach for 3D Multir...
收藏 引用
16th International Conference on Software Technologies (ICSOFT)
作者: Sayahi, Ikbel Ben Amar, Chokri Sfax Univ REs Grp Intelligent Machines Lab REGIM Lab Soukra St Sfax Tunisia Private Natl Engn Sch Monastir ESPRIMS Monastir 5060 Tunisia Taif Univ Coll Comp & Informat Technol At Taif Saudi Arabia
Since the release of the first 3D watermarking algorithm, several approaches have grown up with a diversity of techniques used during the embedding of information into meshes. The main objective is always to secure da... 详细信息
来源: 评论
Computation and communication efficient secure group key exchange protocol for low configuration system
收藏 引用
International Journal of Information Technology (Singapore) 2021年 第3期13卷 839-843页
作者: Rawat, Arjun Singh Deshmukh, Maroti Department of Computer Science and Engineering National Institute of Technology Uttarakhand Srinagar Uttarakhand India
The group key exchange protocol is a cryptographic mechanism is designed to provide a common session key for a group, there are some common challenges to this type of algorithm as computation and communication cost. W... 详细信息
来源: 评论
Image encryption scheme based on blind signature and an improved Lorenz system
收藏 引用
EXPERT SYSTEMS WITH APPLICATIONS 2022年 第0期205卷
作者: Ye, Guodong Wu, Huishan Liu, Min Shi, Yang Guangdong Ocean Univ Fac Math & Comp Sci Zhanjiang 524088 Peoples R China Tongji Univ Sch Software Engn Shanghai 200092 Peoples R China
In this paper, a new improved Lorenz system (ImproLS) is designed with a better behavior due to a larger positive Lyapunov exponent. Then, an asymmetric image encryption scheme is presented based on blind signature an... 详细信息
来源: 评论
Dynamic DNA coding multi-image encryption based on compound chaos
收藏 引用
JOURNAL OF ELECTRONIC IMAGING 2022年 第5期31卷 053007-053007页
作者: Ma, Manman Yu, Xuelian Chen, Hao Xiao, Junjun Li, Xiufang Zhang, Zhichang Harbin Univ Sci & Technol Sch Measurement & Commun Engn Heilongjiang Prov Key Lab Quantum Control Harbin Peoples R China Harbin Inst Technol Shenzhen Coll Elect & Informat Engn Shenzhen Engn Lab Aerosp Detect & Imaging Shenzhen Peoples R China Daheng New Epoch Technol Inc Beijing Peoples R China
We present a dynamic DNA coding multi-image encryption algorithm based on integer lifting wavelet transform and compound chaos. In the encryption process, the low-frequency sub-bands of four plaintexts are extracted t... 详细信息
来源: 评论
Implementation Analysis of Encryption and Decryption algorithm Based on python Language  22
Implementation Analysis of Encryption and Decryption Algorit...
收藏 引用
Proceedings of the 2022 7th International Conference on Systems, Control and Communications
作者: Kai Xiao Wuhan Railway Vocational College of Technology China
Facing the Internet information transmission of WAN or LAN, it is difficult to ensure the security and stability of data transmission after key encryption by using traditional one-way password encryption and two-way s... 详细信息
来源: 评论
A Cryptographic-Based Approach for Electricity Theft Detection in Smart Grid
收藏 引用
Computers, Materials & Continua 2020年 第4期63卷 97-117页
作者: Khelifi Naim Benahmed Khelifa Bounaama Fateh Laboratory of Energetic in Arid Zones(ENERGARID) Department of Electrical EngineeringFaculty of TechnologyTahri Mohammed University of BecharBechar08000Algeria Department of Mathematics and Computer Science Faculty of Exact SciencesTahri Mohammed University of BecharBechar08000Algeria
In order to strengthen their security issues,electrical companies devote particular efforts to developing and enhancing their fraud detection techniques that cope with the information and communication technologies in... 详细信息
来源: 评论
Enhancement of e-commerce security through asymmetric key algorithm
收藏 引用
COMPUTER COMMUNICATIONS 2020年 第0期153卷 125-134页
作者: Dijesh, P. Babu, SuvanamSasidhar Vijayalakshmi, Yellepeddi Bharathiar Univ Dept Comp Sci Coimbatore Tamil Nadu India Reva Univ Sch Comp & Informat Technol Bengaluru 560064 India Karpagam Univ Dept CSE Coimbatore Tamil Nadu India
Electronic commerce offers reduced transaction costs and much convenient mode of business to all over global consumers. This paper explains asymmetric methods which uses electronic commerce transactions and other assi... 详细信息
来源: 评论
Application of Weighted Spiking Neural P Systems with Rules on Synapses for Breaking rsa Encryption
收藏 引用
INTERNATIONAL JOURNAL OF UNCONVENTIONAL COMPUTING 2020年 第1-2期15卷 37-58页
作者: Wang, Huifang Zhou, Kang Zhang, Gexiang Paul, Prithwineel Duan, Yingying Qi, Huaqing Rong, Haina Wuhan Polytech Univ Sch Dept Math & Comp Wuhan 430023 Peoples R China Southwest Jiaotong Univ Sch Dept Elect & Engn Chengdu 610031 Peoples R China Wuhan Polytech Univ Sch Dept Econ & Management Wuhan 430023 Peoples R China
rsa algorithm is one of the most widely used public key encryption algorithm. Breaking rsa encryption is considered very difficult and is well-known as rsa problem. The difficulty of this problem lies in prime factori... 详细信息
来源: 评论
rsa encrypted FSK RF transmission powered by an innovative microwave technique for invulnerable security
收藏 引用
JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS 2022年 第4期19卷 839-854页
作者: Pal, Prashnatita Chandra Sahana, Bikash Poray, Jayanta Natl Inst Technol Patna Dept Elect & Commun Engn Patna 800005 Bihar India Techno India Univ Dept Comp Sci & Engn Kolkata India
Ensuring the secure communication is the prime concern for all kinds of data communication infrastructure. Several data encryption techniques are in use for secure communication. There is a scope for further improveme... 详细信息
来源: 评论
Comment of Secure File Storage and Retrieval in Cloud Based on Mrsa Cryptographic algorithm  9
Comment of Secure File Storage and Retrieval in Cloud Based ...
收藏 引用
9th International Conference on Industrial Technology and Management (ICITM)
作者: Zhong, Zhengrun Liu, Hongxuan Chen, Sonia C-, I Liu, Chenglian Gardner, Donald Neusoft Inst Guangdong Sch Comp Foshan 258225 Peoples R China Huaquiao Univ Sch Econ & Finance Xiamen 361021 Peoples R China Edmonds Community Coll 20000 68th Ave W Lynnwood WA 98036 USA
Data confidentiality is a major concern for data outsourcing. It is especially relevant for data storage and retrieval in cloud where the client has no control over it. Therefore, solutions have been proposed to offer... 详细信息
来源: 评论