咨询与建议

限定检索结果

文献类型

  • 101 篇 会议
  • 87 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 191 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 169 篇 工学
    • 110 篇 计算机科学与技术...
    • 67 篇 电气工程
    • 54 篇 信息与通信工程
    • 18 篇 电子科学与技术(可...
    • 18 篇 控制科学与工程
    • 17 篇 网络空间安全
    • 16 篇 软件工程
    • 8 篇 石油与天然气工程
    • 7 篇 仪器科学与技术
    • 7 篇 材料科学与工程(可...
    • 6 篇 机械工程
    • 5 篇 光学工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 力学(可授工学、理...
    • 1 篇 动力工程及工程热...
  • 40 篇 理学
    • 20 篇 数学
    • 17 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 化学
    • 1 篇 生物学
  • 20 篇 管理学
    • 11 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 4 篇 公共管理
  • 7 篇 医学
    • 4 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 2 篇 经济学
    • 1 篇 理论经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 191 篇 rsa algorithm
  • 36 篇 encryption
  • 30 篇 cryptography
  • 21 篇 decryption
  • 11 篇 security
  • 10 篇 public key
  • 9 篇 public key crypt...
  • 9 篇 private key
  • 8 篇 data security
  • 7 篇 cloud computing
  • 7 篇 fpga
  • 6 篇 modular multipli...
  • 6 篇 aes algorithm
  • 6 篇 steganography
  • 5 篇 image encryption
  • 5 篇 montgomery algor...
  • 5 篇 rsa
  • 5 篇 wireless sensor ...
  • 5 篇 digital signatur...
  • 4 篇 elliptic curve c...

机构

  • 3 篇 brno university ...
  • 2 篇 kongu engn coll ...
  • 2 篇 erciyes univ kay...
  • 2 篇 govt coll engn d...
  • 2 篇 heilongjiang uni...
  • 2 篇 beijing univ pos...
  • 1 篇 univ ruse angel ...
  • 1 篇 department of co...
  • 1 篇 mil univ land fo...
  • 1 篇 michigan technol...
  • 1 篇 department of co...
  • 1 篇 kluvijayawada vi...
  • 1 篇 department of co...
  • 1 篇 anhui univ inst ...
  • 1 篇 nanchang univ de...
  • 1 篇 amrita sai inst ...
  • 1 篇 rajagiri sch eng...
  • 1 篇 miracle educ soc...
  • 1 篇 computation depa...
  • 1 篇 northcap univ ma...

作者

  • 4 篇 walter cd
  • 3 篇 karthikeyan n.
  • 3 篇 eldridge se
  • 2 篇 zhao yongli
  • 2 篇 grossschädl j
  • 2 篇 karatas zekeriya...
  • 2 篇 ding qun
  • 2 篇 zhang jie
  • 2 篇 sethi dimple
  • 2 篇 yuvaraju m.
  • 2 篇 shanthi s.
  • 2 篇 liu chenglian
  • 2 篇 luy erkam
  • 1 篇 yeh sheng lih
  • 1 篇 min h
  • 1 篇 zhi-yuan li
  • 1 篇 wang d. m.
  • 1 篇 boyd c
  • 1 篇 akhtar muhammad ...
  • 1 篇 genkin daniel

语言

  • 172 篇 英文
  • 10 篇 其他
  • 9 篇 中文
检索条件"主题词=RSA algorithm"
191 条 记 录,以下是31-40 订阅
排序:
rsa Cipher algorithm Improvements and VC Programming Realization
RSA Cipher Algorithm Improvements and VC Programming Realiza...
收藏 引用
International Conference on Graphic and Image Processing (ICGIP)
作者: Wei, Xianmin Weifang Univ Comp & Commun Engn Sch Weifang Peoples R China
This paper discusses the rsa algorithm basic mathematical principle, on the basis to propose a faster design improvement. Programming with Visual C proved that the operation speed of improved rsa algorithm is greatly ... 详细信息
来源: 评论
Attack resistant blockchain-based healthcare record system using modified rsa algorithm
收藏 引用
International Journal of Information Technology (Singapore) 2024年 第1期16卷 417-424页
作者: Srivastava, Arushi Gupta, Juhi Jaypee Institute of Information Technology Uttar Pradesh Noida India
Electronic Health Records (EHRs) are steadily becoming the central information system for the healthcare industry. EHRs are not completely secure and highly vulnerable to the malicious attacks. Blockchain provides an ... 详细信息
来源: 评论
Research on Java application of rsa algorithm based on RMI-IIOP
收藏 引用
Wuhan Ligong Daxue Xuebao/Journal of Wuhan University of Technology 2006年 第9期28卷 86-89页
作者: Zhang, Nan-Ping Liu, Rui-Ting Chen, Yong Wu, Qiang School of Computer Science and Technology Wuhan University of Technology Wuhan 430070 China
rsa algorithm is an influential public-key encrypt algorithm at present, which can resist almost all cryptogram attack as yet. It is so convenient by using rsa-IIOP to compile distributed program and realize distribut... 详细信息
来源: 评论
The Application of rsa Encryption algorithm in the Hainan Rural Tourism Management Platform
The Application of RSA Encryption Algorithm in the Hainan Ru...
收藏 引用
2017 2nd International Conference on Education,Sports,Arts and Management Engineering(ICESAME 2017)
作者: Huijuan Xie Hainan College of Economics and Business
With the development of information technology, such as Big Data, O2O, Cloud Computing, the Internet of Things and Artificial Intelligence, the Hainan Rural Tourism Wisdom Management Platform should provide complete, ... 详细信息
来源: 评论
S-box using fractional-order 4D hyperchaotic system and its application to rsa cryptosystem-based color image encryption
收藏 引用
COMPUTER STANDARDS & INTERFACES 2025年 93卷
作者: Ullah, Saeed Liu, Xinge Waheed, Adil China, Shuailei Zhang Cent South Univ Sch Math & Stat Changsha 410083 Hunan Peoples R China Univ Educ Dept Informat Sci Div Sci & Technol Lahore 54770 Pakistan
An algorithm for substitution box (S-box) construction is proposed by using fractional-order (FO) 4D hyperchaotic system in this paper. Based on hyperchaotic sequences generated by the FO 4D hyperchaotic system, exclu... 详细信息
来源: 评论
A Comprehensive Analysis of Cryptographic algorithms: Evaluating Security, Efficiency, and Future Challenges
收藏 引用
IEEE ACCESS 2025年 13卷 11576-11593页
作者: Ramakrishna, Donagani Shaik, Mohammed Ali SR Univ Warangal 506371 Telangana India
Cryptographic techniques are reviewed in this literature review, with particular attention paid to their applicability, importance, contributions, and field strengths. These algorithms include DES, 3DES, AES, blowfish... 详细信息
来源: 评论
Enhancing Data Security in IoV Communications Through Triplet Layered Approach
收藏 引用
IETE JOURNAL OF RESEARCH 2025年
作者: Karthikeyan, N. Shanthi, S. Govt Coll Engn Dept Comp Sci & Engn Thanjavur Tamil Nadu India Kongu Engn Coll Dept Comp Sci & Engn Erode Tamil Nadu India
Recent innovations in cloud computing and the Internet of Things (IoT) have reshaped numerous real-time applications. However, the exchange of sensitive information within these systems requires strong security measur... 详细信息
来源: 评论
A Study of Cryptographic algorithms on Special Linear Group Over Ring of Integers Modulo m
收藏 引用
IEEE ACCESS 2025年 13卷 5606-5617页
作者: Lipinski, Zbigniew Mizera-Pietraszko, Jolanta Tancula, Jolanta Univ Opole Dept Math Phys & Comp Sci PL-45052 Opole Poland Mil Univ Land Forces Dept Res Methodol PL-51147 Wroclaw Poland
Despite the development of numerous cryptographic algorithms over the last decade to ensure greater security for the users, the cyberattack forms are still advancing, which creates a challenge for the research communi... 详细信息
来源: 评论
CYBERGUARD: A FORTIFIED MESSAGE AUTHENTICATION PROTOCOL WITH DIGITAL SIGNATURES IN NS-2 SIMULATION ENVIRONMENT
收藏 引用
SCALABLE COMPUTING-PRACTICE AND EXPERIENCE 2025年 第1期26卷 114-122页
作者: Kumar, Prashant Sethi, Dimple Shrivastava, Gulshan Srivastava, Neeraj Bennett Univ SCSET Times Grp Plot 8-11TechZone 2 Greater Noida 201310 Uttar Pradesh India Agra Coll Dept Math Agra 282001 Uttar Pradesh India
Delving into the dynamic realm of communication networks, the Network Simulator-2 (NS-2) emerges as a versatile, object-oriented, and event-driven mirror, analysing the intricacies of computer network. NS-2, an open-s... 详细信息
来源: 评论
Med-tech device security through advanced server cryptography
收藏 引用
International Journal of Information Technology (Singapore) 2025年 第2期17卷 1015-1022页
作者: Sharan, Preeta Yasmeen, M.S. Nagesh, N. Parimi, Pranav Chetan, V. Roy, Sandip Kumar Department of Electronics and Communication (R & D) The Oxford College of Engineering Bangalore India Department of Electronics and Communication Engineering The Oxford College of Engineering Bangalore India Department of Computer Science Engineering Amrita Vishwa Vidyapeetham Bangalore India Research and Development The Oxford College of Engineering Bangalore India S P Jain School of Global Management Dubai United Arab Emirates
To protect secrecy without compromising data, the study outlines a strong security framework for communications between mobile devices and servers and recommends encryption as the best option. Traditional encryption t... 详细信息
来源: 评论