咨询与建议

限定检索结果

文献类型

  • 102 篇 会议
  • 86 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 191 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 169 篇 工学
    • 111 篇 计算机科学与技术...
    • 67 篇 电气工程
    • 55 篇 信息与通信工程
    • 19 篇 控制科学与工程
    • 18 篇 电子科学与技术(可...
    • 18 篇 网络空间安全
    • 16 篇 软件工程
    • 8 篇 石油与天然气工程
    • 7 篇 机械工程
    • 7 篇 仪器科学与技术
    • 7 篇 材料科学与工程(可...
    • 5 篇 光学工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 力学(可授工学、理...
    • 1 篇 动力工程及工程热...
  • 39 篇 理学
    • 20 篇 数学
    • 17 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 化学
    • 1 篇 生物学
  • 20 篇 管理学
    • 11 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 4 篇 公共管理
  • 7 篇 医学
    • 4 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 2 篇 经济学
    • 1 篇 理论经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 191 篇 rsa algorithm
  • 37 篇 encryption
  • 31 篇 cryptography
  • 21 篇 decryption
  • 11 篇 security
  • 10 篇 public key
  • 9 篇 public key crypt...
  • 9 篇 private key
  • 8 篇 data security
  • 7 篇 cloud computing
  • 7 篇 fpga
  • 6 篇 modular multipli...
  • 6 篇 aes algorithm
  • 6 篇 steganography
  • 5 篇 image encryption
  • 5 篇 montgomery algor...
  • 5 篇 rsa
  • 5 篇 wireless sensor ...
  • 5 篇 digital signatur...
  • 4 篇 elliptic curve c...

机构

  • 3 篇 brno university ...
  • 2 篇 kongu engn coll ...
  • 2 篇 erciyes univ kay...
  • 2 篇 govt coll engn d...
  • 2 篇 heilongjiang uni...
  • 2 篇 beijing univ pos...
  • 1 篇 univ ruse angel ...
  • 1 篇 department of co...
  • 1 篇 mil univ land fo...
  • 1 篇 michigan technol...
  • 1 篇 department of co...
  • 1 篇 kluvijayawada vi...
  • 1 篇 department of co...
  • 1 篇 anhui univ inst ...
  • 1 篇 nanchang univ de...
  • 1 篇 amrita sai inst ...
  • 1 篇 rajagiri sch eng...
  • 1 篇 miracle educ soc...
  • 1 篇 computation depa...
  • 1 篇 northcap univ ma...

作者

  • 4 篇 walter cd
  • 3 篇 karthikeyan n.
  • 3 篇 eldridge se
  • 2 篇 zhao yongli
  • 2 篇 grossschädl j
  • 2 篇 karatas zekeriya...
  • 2 篇 ding qun
  • 2 篇 zhang jie
  • 2 篇 sethi dimple
  • 2 篇 yuvaraju m.
  • 2 篇 shanthi s.
  • 2 篇 liu chenglian
  • 2 篇 luy erkam
  • 1 篇 yeh sheng lih
  • 1 篇 min h
  • 1 篇 zhi-yuan li
  • 1 篇 wang d. m.
  • 1 篇 boyd c
  • 1 篇 akhtar muhammad ...
  • 1 篇 genkin daniel

语言

  • 172 篇 英文
  • 10 篇 其他
  • 9 篇 中文
检索条件"主题词=RSA Algorithm"
191 条 记 录,以下是71-80 订阅
排序:
Reducing the Required Time and Power for Data Encryption and Decryption Using K-NN Machine Learning
收藏 引用
IETE JOURNAL OF RESEARCH 2019年 第2期65卷 227-235页
作者: Bokhari, Mohammad Ubaidullah Shallal, Qahtan Makki Tamandani, Yahya Kord Aligarh Muslim Univ Dept Comp Sci Aligarh Uttar Pradesh India Univ Sistan & Baluchestan Dept Comp Sci Zahedan Iran
Cloud computing allows the users to store their data in its storage and use them whenever they need. While the data of user is traveling outside its physical infrastructure through Internet, it needs to use a very str... 详细信息
来源: 评论
Modified Adhoc On-Demand Distance Vector for Trust Evaluation And Attack Detection
收藏 引用
Intelligent Automation & Soft Computing 2023年 第5期36卷 1227-1240页
作者: S.Soundararajan B.R.Tapas Bapu C.Kotteeswaran S.Venkatasubramanian P.J.Sathish Kumar Ahmed Mudassar Ali Anna University Chennai600025Tamil NaduIndia S.A.Engineering College VeeraraghavapChennai600077Tamil NaduIndia Saranathan College of Engineering Trichy620019Tamil NaduIndia Panimalar Engineering College Chennai600069TamilnaduIndia
Recently,Wireless Sensor Network(WSN)becomes most potential technologies for providing improved services to several data gathering and track-ing *** of the wireless medium,multi-hop communication,absence of physical p... 详细信息
来源: 评论
Knapsack based ECC for digital signature authentication
收藏 引用
INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS 2009年 第4期3卷 384-392页
作者: Rajaram, R. Prabakar, M. Amutha Devi, M. Indra Thiagarajar Coll Engn Dept CSE Madurai 625015 Tamil Nadu India Thiagarajar Coll Engn Dept IT Madurai 625015 Tamil Nadu India
Elliptic curve cryptography (ECC) provides a secure means of exchanging keys among communicating hosts using the Diffie Hellman key exchange algorithm. Encryption and decryption of texts and messages have also been at... 详细信息
来源: 评论
METHOD TO IMPLEMENT PACKET LEVEL ACCESS-CONTROL IN MULTINETWORKS
收藏 引用
ELECTRONICS LETTERS 1989年 第25期25卷 1742-1744页
作者: POON, FSF IQBAL, SM Sch. of Eng. & Appl. Sci. Sussex Univ. Brighton UK
Describes a method to implement an access control policy for multinetwork environments. The access control method is based on the public-key cryptosystem proposed by Rivest, Shamir and Adleman (rsa) and on the message... 详细信息
来源: 评论
Comment on "An Enhanced and Secured rsa Key Generation Scheme (ESRKGS)"
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2016年 30卷 1-+页
作者: Luy, Erkam Karatas, Zekeriya Y. Ergin, Huseyin Erciyes Univ Kayseri Turkey Tuskegee Univ Tuskegee AL 36088 USA Univ Alabama Tuscaloosa AL USA
In this article, we do the cryptanalysis of the Enhanced and Secured rsa Key Generation Scheme (ESRKGS) given in Thangavel et al. (2015). The authors claimed that ESRKGS is a highly secure and not easily breakable sch... 详细信息
来源: 评论
Secure MIMO Visible Light Communication System Based on User's Location and Encryption
收藏 引用
JOURNAL OF LIGHTWAVE TECHNOLOGY 2017年 第24期35卷 5324-5334页
作者: Mousa, Farag Ibrahim Khalifa Al Maadeed, Noor Busawon, Krishna Bouridane, Ahmed Binns, Richard Northumbria Univ Fac Engn & Environm Newcastle Upon Tyne NE1 8ST Tyne & Wear England Qatar Univ Dept Comp Sci & Engn Doha 2713 Qatar
Visible light communication systems are rapidly growing research areas with wide applications ranging from illumination and data communication. To achieve high data rates in such systems, a number of techniques have b... 详细信息
来源: 评论
A Secure Method for Data Storage and Transmission in Sustainable Cloud Computing
收藏 引用
Computers, Materials & Continua 2023年 第5期75卷 2741-2757页
作者: Muhammad Usman Sana Zhanli Li Tayybah Kiren Hannan Bin Liaqat Shahid Naseem Atif Saeed College of Computer Science and Technology Xi’an University of Science and TechnologyXi’anShaanxi710054China Department of Computer Science(RCET Campus) University of Engineering and TechnologyLahore39161Pakistan Department of Information Sciences Division of Science&TechnologyUniversity of EducationLahore54700Pakistan Department of Computer Science COMSATS UniversityIslamabadLahore54700Pakistan
Cloud computing is a technology that provides secure storage space for the customer’s massive data and gives them the facility to retrieve and transmit their data efficiently through a secure network in which encrypt... 详细信息
来源: 评论
Application of Weighted Spiking Neural P Systems with Rules on Synapses for Breaking rsa Encryption
收藏 引用
INTERNATIONAL JOURNAL OF UNCONVENTIONAL COMPUTING 2020年 第1-2期15卷 37-58页
作者: Wang, Huifang Zhou, Kang Zhang, Gexiang Paul, Prithwineel Duan, Yingying Qi, Huaqing Rong, Haina Wuhan Polytech Univ Sch Dept Math & Comp Wuhan 430023 Peoples R China Southwest Jiaotong Univ Sch Dept Elect & Engn Chengdu 610031 Peoples R China Wuhan Polytech Univ Sch Dept Econ & Management Wuhan 430023 Peoples R China
rsa algorithm is one of the most widely used public key encryption algorithm. Breaking rsa encryption is considered very difficult and is well-known as rsa problem. The difficulty of this problem lies in prime factori... 详细信息
来源: 评论
MODERN DATA ENCRYPTION
收藏 引用
ELECTRONICS & COMMUNICATION ENGINEERING JOURNAL 1993年 第5期5卷 271-278页
作者: BOYD, C Communications Research Group Electrical Engineering Laboratories University of Manchester Manchester UK
Communications security is increasing in importance as a result of the use of electronic communications in more and more business activities. Cryptography is the only practical means to provide security services in ma... 详细信息
来源: 评论
EXPONENTIATION MODULO A POLYNOMIAL FOR DATA-SECURITY
收藏 引用
INTERNATIONAL JOURNAL OF COMPUTER & INFORMATION SCIENCES 1983年 第5期12卷 337-346页
作者: KAK, SC 1. Department of Electrical and Computer Engineering Louisiana State University 70803 Baton Rouge Louisiana
This paper describes some properties of exponentiation modulo a polynomial and suggests its use for encryption in a mode that can be cryptanalyzed in approximatelyO(pd 3) time, whered is the size of the message frame ... 详细信息
来源: 评论