咨询与建议

限定检索结果

文献类型

  • 101 篇 会议
  • 87 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 191 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 169 篇 工学
    • 110 篇 计算机科学与技术...
    • 67 篇 电气工程
    • 54 篇 信息与通信工程
    • 18 篇 电子科学与技术(可...
    • 18 篇 控制科学与工程
    • 17 篇 网络空间安全
    • 16 篇 软件工程
    • 8 篇 石油与天然气工程
    • 7 篇 仪器科学与技术
    • 7 篇 材料科学与工程(可...
    • 6 篇 机械工程
    • 5 篇 光学工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 力学(可授工学、理...
    • 1 篇 动力工程及工程热...
  • 40 篇 理学
    • 20 篇 数学
    • 17 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 化学
    • 1 篇 生物学
  • 20 篇 管理学
    • 11 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 4 篇 公共管理
  • 7 篇 医学
    • 4 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 2 篇 经济学
    • 1 篇 理论经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 191 篇 rsa algorithm
  • 36 篇 encryption
  • 30 篇 cryptography
  • 21 篇 decryption
  • 11 篇 security
  • 10 篇 public key
  • 9 篇 public key crypt...
  • 9 篇 private key
  • 8 篇 data security
  • 7 篇 cloud computing
  • 7 篇 fpga
  • 6 篇 modular multipli...
  • 6 篇 aes algorithm
  • 6 篇 steganography
  • 5 篇 image encryption
  • 5 篇 montgomery algor...
  • 5 篇 rsa
  • 5 篇 wireless sensor ...
  • 5 篇 digital signatur...
  • 4 篇 elliptic curve c...

机构

  • 3 篇 brno university ...
  • 2 篇 kongu engn coll ...
  • 2 篇 erciyes univ kay...
  • 2 篇 govt coll engn d...
  • 2 篇 heilongjiang uni...
  • 2 篇 beijing univ pos...
  • 1 篇 univ ruse angel ...
  • 1 篇 department of co...
  • 1 篇 mil univ land fo...
  • 1 篇 michigan technol...
  • 1 篇 department of co...
  • 1 篇 kluvijayawada vi...
  • 1 篇 department of co...
  • 1 篇 anhui univ inst ...
  • 1 篇 nanchang univ de...
  • 1 篇 amrita sai inst ...
  • 1 篇 rajagiri sch eng...
  • 1 篇 miracle educ soc...
  • 1 篇 computation depa...
  • 1 篇 northcap univ ma...

作者

  • 4 篇 walter cd
  • 3 篇 karthikeyan n.
  • 3 篇 eldridge se
  • 2 篇 zhao yongli
  • 2 篇 grossschädl j
  • 2 篇 karatas zekeriya...
  • 2 篇 ding qun
  • 2 篇 zhang jie
  • 2 篇 sethi dimple
  • 2 篇 yuvaraju m.
  • 2 篇 shanthi s.
  • 2 篇 liu chenglian
  • 2 篇 luy erkam
  • 1 篇 yeh sheng lih
  • 1 篇 min h
  • 1 篇 zhi-yuan li
  • 1 篇 wang d. m.
  • 1 篇 boyd c
  • 1 篇 akhtar muhammad ...
  • 1 篇 genkin daniel

语言

  • 172 篇 英文
  • 10 篇 其他
  • 9 篇 中文
检索条件"主题词=RSA algorithm"
191 条 记 录,以下是11-20 订阅
排序:
Image Steganography using rsa algorithm for Secure Communication
Image Steganography using RSA Algorithm for Secure Communica...
收藏 引用
International Conference on Mobile Networks and Wireless Communications (ICMNWC)
作者: Preksha, B. Harish, Rishika Sreenivas, B. Vasanthalakshmi, M. BMS Coll Engn Dept Elect & Telecommun Bangalore Karnataka India
Steganography is a method of transmitting a secret message from a sender to a recipient in such a way that a potential intruder is unaware of its presence. The basic goal of image steganography is to make the message ... 详细信息
来源: 评论
Virtual optical encryption using phase shifted digital holography and rsa algorithm  3
Virtual optical encryption using phase shifted digital holog...
收藏 引用
3rd International Conference on Microwave and Photonics (ICMAP)
作者: Chatterjee, Amit Dhanotia, Jitendra Bhatia, Vimal Prakash, Shashi Indian Inst Technol Indore Discipline Elect Engn Indore Madhya Pradesh India Devi Ahilya Univ Photon Lab Inst Engn & Technol Indore Madhya Pradesh India
Optical image encryption is one of the most promising technologies being investigated in the field of data communication, information technology and cloud computing. In this paper, a novel image encryption system base... 详细信息
来源: 评论
Security of Cloud Intelligent Robot Based on rsa algorithm and Digital Signature
Security of Cloud Intelligent Robot Based on RSA Algorithm a...
收藏 引用
IEEE Symposium Series on Computational Intelligence (SSCI)
作者: Cai, Huili Liu, Xiaofeng Cangelosi, Angelo Hohai Univ Changzhou Key Lab Robot & Intelligent Coll IoT Engn Changzhou 213022 Peoples R China Hohai Univ Coll IoT Engn Changzhou 213022 Peoples R China Univ Manchester Manchester M13 9RL Lancs England
Considering the security of message exchange between service robot and cloud, we propose to authenticate the message integrity based on rsa algorithm and digital signature. In the process of message transmission, rsa ... 详细信息
来源: 评论
SECURE INTRUSION DETECTION SYSTEM IN MOBILE AD HOC NETWORKS USING rsa algorithm  2
SECURE INTRUSION DETECTION SYSTEM IN MOBILE AD HOC NETWORKS ...
收藏 引用
2nd International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)
作者: Sankaranarayanan, S. Murugaboopathi, G. Kalasalingam Univ Comp Sci & Engn Krishnankoil India
Nowadays Mobile Ad Hoc Networks has become a popular research subject due to its characteristics. Generally Mobile Ad Hoc Networks have given the low physical security for mobile devices. With this problem there are m... 详细信息
来源: 评论
A novel ASIC implementation of rsa algorithm  5
A novel ASIC implementation of RSA algorithm
收藏 引用
5th International Conference on ASIC
作者: Zhu, KJ Xu, K Wang, Y Min, H Fudan Univ ASIC & Syst State Key Lab Shanghai 200433 Peoples R China
In this paper, a novel ASIC implementation of rsa algorithm is presented, By utilizing Yang's modified Montgomery algorithm, the over-large residue problem is eliminated. The multiplication and Montgomery modular ... 详细信息
来源: 评论
Reliability of rsa algorithm and its computational complexity  2
Reliability of RSA algorithm and its computational complexit...
收藏 引用
2nd IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems
作者: Karpinskyy, M Kinakh, Y Universytet Bjelsku-Bjala Poland Ternopil Academy of National Economy Institute of Computer Information Technologies Department of Information Technologies Security 3 Peremoga Square Ternopil 46004 Ukraine
This article deals with the rsa encryption algorithm. Its safety is analyzed using the number field sieve method The algorithm work results allow to define a define a secret key in a simple way.
来源: 评论
The performance testing of rsa algorithm software realization
The performance testing of RSA algorithm software realizatio...
收藏 引用
9th International Conference on the Experience of Designing and Application of CAD Systems in Microelectronics
作者: Yakovyna, Vitaly Fedasyuk, Dmytro Seniv, Maxym Bilas, Orest Lviv Polytech Natl Univ Software Engn Dept 12 S Bandery Str UA-79013 Lvov Ukraine
The software realization of rsa public key encryption algorithm using CryptoAPI on .NET platform has been analyzed. The processing performance of the software implementation has been tested. The present paper shows, t... 详细信息
来源: 评论
Software Implementation of a Module for Encryption and Decryption Using the rsa algorithm  25
Software Implementation of a Module for Encryption and Decry...
收藏 引用
25th International Scientific Conference on Electronics (ET)
作者: Borodzhieva, Adriana Naydenova Univ Ruse Angel Kanchev Fac Elect Engn Elect & Automat Dept Telecommun 8 Studentska Str Ruse 7017 Bulgaria
The paper describes MS EXCEL-based application implementing the processes of encryption and decryption of texts in English and/or Bulgarian using the rsa algorithm. The processes of encryption and decryption are illus... 详细信息
来源: 评论
A Secure IoT Based Grid-Connected Inverter using rsa algorithm.  31
A Secure IoT Based Grid-Connected Inverter using RSA Algorit...
收藏 引用
31st Australasian Universities Power Engineering Conference (AUPEC)
作者: Ahmed, Nasim Khan, Md Ziaur Rahman Bangladesh Univ Engn & Technol Inst Informat & Commun Technol Dhaka 1000 Bangladesh Bangladesh Univ Engn & Technol Elect & Elect Engn Dhaka 1000 Bangladesh
The model of the internet of things (IoT) based single-phase grid-connected inverter using rsa (Rivest-Shamir-Adleman) algorithm is presented here. The inverter is developed by H-bridge architecture and sinusoidal pul... 详细信息
来源: 评论
Optimization of rsa algorithm implementation on TI TMS320C54x signal processors
Optimization of RSA algorithm implementation on TI TMS320C54...
收藏 引用
5th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Service
作者: Unkasevic, T Markovic, M Dordevic, G Inst Appl Math & Elect YU-11000 Belgrade Yugoslavia
In this work, possible optimization techniques of the rsa algorithm realization on assembler of Texas Instruments TMS320C54x family of signal processors are considered. Obtained results justify the use of the proposed... 详细信息
来源: 评论