咨询与建议

限定检索结果

文献类型

  • 101 篇 会议
  • 86 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 190 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 168 篇 工学
    • 110 篇 计算机科学与技术...
    • 67 篇 电气工程
    • 54 篇 信息与通信工程
    • 18 篇 电子科学与技术(可...
    • 18 篇 控制科学与工程
    • 17 篇 网络空间安全
    • 16 篇 软件工程
    • 8 篇 石油与天然气工程
    • 7 篇 仪器科学与技术
    • 7 篇 材料科学与工程(可...
    • 6 篇 机械工程
    • 5 篇 光学工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 力学(可授工学、理...
    • 1 篇 动力工程及工程热...
  • 39 篇 理学
    • 20 篇 数学
    • 17 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 化学
    • 1 篇 生物学
  • 20 篇 管理学
    • 11 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 4 篇 公共管理
  • 7 篇 医学
    • 4 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 2 篇 经济学
    • 1 篇 理论经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 190 篇 rsa algorithm
  • 36 篇 encryption
  • 30 篇 cryptography
  • 21 篇 decryption
  • 11 篇 security
  • 10 篇 public key
  • 9 篇 public key crypt...
  • 9 篇 private key
  • 8 篇 data security
  • 7 篇 cloud computing
  • 7 篇 fpga
  • 6 篇 modular multipli...
  • 6 篇 aes algorithm
  • 6 篇 steganography
  • 5 篇 image encryption
  • 5 篇 montgomery algor...
  • 5 篇 rsa
  • 5 篇 wireless sensor ...
  • 5 篇 digital signatur...
  • 4 篇 elliptic curve c...

机构

  • 3 篇 brno university ...
  • 2 篇 kongu engn coll ...
  • 2 篇 erciyes univ kay...
  • 2 篇 govt coll engn d...
  • 2 篇 heilongjiang uni...
  • 2 篇 beijing univ pos...
  • 1 篇 univ ruse angel ...
  • 1 篇 department of co...
  • 1 篇 mil univ land fo...
  • 1 篇 michigan technol...
  • 1 篇 department of co...
  • 1 篇 kluvijayawada vi...
  • 1 篇 department of co...
  • 1 篇 anhui univ inst ...
  • 1 篇 nanchang univ de...
  • 1 篇 amrita sai inst ...
  • 1 篇 rajagiri sch eng...
  • 1 篇 miracle educ soc...
  • 1 篇 computation depa...
  • 1 篇 northcap univ ma...

作者

  • 4 篇 walter cd
  • 3 篇 karthikeyan n.
  • 3 篇 eldridge se
  • 2 篇 zhao yongli
  • 2 篇 grossschädl j
  • 2 篇 karatas zekeriya...
  • 2 篇 ding qun
  • 2 篇 zhang jie
  • 2 篇 sethi dimple
  • 2 篇 yuvaraju m.
  • 2 篇 shanthi s.
  • 2 篇 liu chenglian
  • 2 篇 luy erkam
  • 1 篇 yeh sheng lih
  • 1 篇 min h
  • 1 篇 zhi-yuan li
  • 1 篇 wang d. m.
  • 1 篇 boyd c
  • 1 篇 akhtar muhammad ...
  • 1 篇 genkin daniel

语言

  • 171 篇 英文
  • 10 篇 其他
  • 9 篇 中文
检索条件"主题词=RSA Algorithm"
190 条 记 录,以下是81-90 订阅
排序:
Random distribution of polydisperse ellipsoidal inclusions and homogenization estimates for porous elastic materials
收藏 引用
COMPUTERS & STRUCTURES 2018年 第Nov.期210卷 87-101页
作者: Anoukou, K. Brenner, R. Hong, F. Pellerin, M. Danas, K. Ecole Polytech CNRS LMS F-91128 Palaiseau France Sorbonne Univ CNRS Inst Jean Le Rond dAlembert F-75005 Paris France Total R&D Carbonate Explorat & Prod F-64018 Pau France
This work proposes an extension of the well-known random sequential adsorption (rsa) method in the context of non-overlapping random mono- and polydisperse ellipsoidal inclusions. The algorithm is general and can deal... 详细信息
来源: 评论
Enhanced, Modified and Secured rsa Cryptosystem based on n Prime Numbers and Offline Storage for Medical Data Transmission via Mobile Phone
收藏 引用
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS 2019年 第10期10卷 353-360页
作者: Thiziers, Achi Harrisson Theodore, Haba Cisse Zoueu, Jeremie T. Michel, Babri INP HB DFR GEE Instrumentat Imaging & Spect Lab L2IS Yamoussoukro Cote Ivoire INP HB Abidjan Comp Sci & Telecoms Networks Lab LARIT Abidjan Cote Ivoire
The transmission of medical data by mobile telephony is an innovation that constitutes the m-health or more generally e-health. This telemedicine handles personal data of patients who deserve to be protected when they... 详细信息
来源: 评论
Evolution of SIM Cards - What's Next?  7
Evolution of SIM Cards - What's Next?
收藏 引用
7th International Conference on Computing, Communications and Informatics (ICACCI)
作者: Koshy, Deepu George Rao, Sethuraman N. Amritapuri Amrita Vishwa Vidyapeetham Amrita Sch Engn Amrita Ctr Wireless Networks & Applicat AmritaWNA Amritapuri India
Subscriber Identity Module (SIM) is an integrated circuit card on the mobile phone used for identifying and authenticating subscribers on mobile networks and for establishing a connection with the mobile network. Over... 详细信息
来源: 评论
Access Control System Based on Encryption in QR-Code Technology  4
Access Control System Based on Encryption in QR-Code Technol...
收藏 引用
4th IEEE International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS)
作者: Susukailo, Vitalii Lakh, Yuriy Lviv Polytech Natl Univ Informat Secur Dept Vul Knyazya Romana 1 UA-79005 Lvov Ukraine
The subject matter of this paper is to provide information security for an authorized data within the access control systems using encryption technique in QR-code technology. The research goal was investigation of pro... 详细信息
来源: 评论
Design of password encryption model based on AES algorithm
Design of password encryption model based on AES algorithm
收藏 引用
IEEE International Conference on Civil Aviation Safety and Information Technology (ICCASIT)
作者: Ying Liu Wei Zhang Xinxia Peng Yan Liu Sida Zheng Tongjia Wei Liang Wang State Grid Jibei Electric Power Company Limited Beijing China NARI Group Corporation / State Electric Power Research Institute Nanjing China
Aiming at the demand for information system password encryption protection, this paper proposed a new set of password storage and transmission encryption model. In the process of password storage encryption, this pape... 详细信息
来源: 评论
Securing Medical Images for Mobile Health Systems Using a Combined Approach of Encryption and Steganography  14th
Securing Medical Images for Mobile Health Systems Using a Co...
收藏 引用
14th International Conference on Intelligent Computing (ICIC)
作者: Jiang, Tao Zhang, Kai Tang, Jinshan Wuhan Univ Sci & Technol Coll Comp Sci & Technol Wuhan 430065 Hubei Peoples R China Michigan Technol Univ Sch Technol Houghton MI 49931 USA
In this paper, we propose a medical image encryption scheme which can be used in mobile health systems. The proposed scheme combines rsa algorithm, logistic chaotic encryption algorithm, and steganography technique to... 详细信息
来源: 评论
A Hybrid Security algorithm for rsa Cryptosystem  4
A Hybrid Security Algorithm for RSA Cryptosystem
收藏 引用
4th International Conference on Advanced Computing and Communication Systems (ICACCS)
作者: Panda, Prabhat K. Chattopadhyay, Sudipta Jadavpur Univ Dept Elect & Telecommun Engn Kolkata India
This paper presents a new Hybrid security algorithm for rsa cryptosystem named as Hybrid rsa (Hrsa). Here computation of "public key" (P) as well as "private key" (Q) depends on the value of M, whe... 详细信息
来源: 评论
Secure MIMO Visible Light Communication System Based on User's Location and Encryption
收藏 引用
JOURNAL OF LIGHTWAVE TECHNOLOGY 2017年 第24期35卷 5324-5334页
作者: Mousa, Farag Ibrahim Khalifa Al Maadeed, Noor Busawon, Krishna Bouridane, Ahmed Binns, Richard Northumbria Univ Fac Engn & Environm Newcastle Upon Tyne NE1 8ST Tyne & Wear England Qatar Univ Dept Comp Sci & Engn Doha 2713 Qatar
Visible light communication systems are rapidly growing research areas with wide applications ranging from illumination and data communication. To achieve high data rates in such systems, a number of techniques have b... 详细信息
来源: 评论
Research on Cache Timing Attack Against rsa with Sliding Window Exponentiation algorithm
收藏 引用
INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING 2016年 第2期8卷 88-95页
作者: Chen, Caisen Xiang, Yangxia DengLiu, Yuqin Zhou, Zeyun Acad Armored Forces Engn Minist Sci Res Beijing Peoples R China Acad Armored Forces Engn Dept Informat Engn Beijing Peoples R China
The vulnerabilities of the rsa cryptographic algorithm are analyzed, and it is not securely implemented. As the simultaneous multithreading could enable multiple execution threads to share the execution resources of a... 详细信息
来源: 评论
Encryption algorithm using Dual Modulus  3
Encryption Algorithm using Dual Modulus
收藏 引用
3rd IEEE International Conference on Computational Intelligence and Communication Technology (CICT)
作者: Manu Goel, Aarti ABES Engn Coll Ghaziabad India
Dual modulus play important role in increasing the complexity of decomposing values into factors as compared to single modulus. This paper is based on rsa algorithm. Proposed encryption algorithm is more secure as com... 详细信息
来源: 评论