咨询与建议

限定检索结果

文献类型

  • 101 篇 会议
  • 87 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 191 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 169 篇 工学
    • 110 篇 计算机科学与技术...
    • 67 篇 电气工程
    • 54 篇 信息与通信工程
    • 18 篇 电子科学与技术(可...
    • 18 篇 控制科学与工程
    • 17 篇 网络空间安全
    • 16 篇 软件工程
    • 8 篇 石油与天然气工程
    • 7 篇 仪器科学与技术
    • 7 篇 材料科学与工程(可...
    • 6 篇 机械工程
    • 5 篇 光学工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 力学(可授工学、理...
    • 1 篇 动力工程及工程热...
  • 40 篇 理学
    • 20 篇 数学
    • 17 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 化学
    • 1 篇 生物学
  • 20 篇 管理学
    • 11 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 4 篇 公共管理
  • 7 篇 医学
    • 4 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 2 篇 经济学
    • 1 篇 理论经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 191 篇 rsa algorithm
  • 36 篇 encryption
  • 30 篇 cryptography
  • 21 篇 decryption
  • 11 篇 security
  • 10 篇 public key
  • 9 篇 public key crypt...
  • 9 篇 private key
  • 8 篇 data security
  • 7 篇 cloud computing
  • 7 篇 fpga
  • 6 篇 modular multipli...
  • 6 篇 aes algorithm
  • 6 篇 steganography
  • 5 篇 image encryption
  • 5 篇 montgomery algor...
  • 5 篇 rsa
  • 5 篇 wireless sensor ...
  • 5 篇 digital signatur...
  • 4 篇 elliptic curve c...

机构

  • 3 篇 brno university ...
  • 2 篇 kongu engn coll ...
  • 2 篇 erciyes univ kay...
  • 2 篇 govt coll engn d...
  • 2 篇 heilongjiang uni...
  • 2 篇 beijing univ pos...
  • 1 篇 univ ruse angel ...
  • 1 篇 department of co...
  • 1 篇 mil univ land fo...
  • 1 篇 michigan technol...
  • 1 篇 department of co...
  • 1 篇 kluvijayawada vi...
  • 1 篇 department of co...
  • 1 篇 anhui univ inst ...
  • 1 篇 nanchang univ de...
  • 1 篇 amrita sai inst ...
  • 1 篇 rajagiri sch eng...
  • 1 篇 miracle educ soc...
  • 1 篇 computation depa...
  • 1 篇 northcap univ ma...

作者

  • 4 篇 walter cd
  • 3 篇 karthikeyan n.
  • 3 篇 eldridge se
  • 2 篇 zhao yongli
  • 2 篇 grossschädl j
  • 2 篇 karatas zekeriya...
  • 2 篇 ding qun
  • 2 篇 zhang jie
  • 2 篇 sethi dimple
  • 2 篇 yuvaraju m.
  • 2 篇 shanthi s.
  • 2 篇 liu chenglian
  • 2 篇 luy erkam
  • 1 篇 yeh sheng lih
  • 1 篇 min h
  • 1 篇 zhi-yuan li
  • 1 篇 wang d. m.
  • 1 篇 boyd c
  • 1 篇 akhtar muhammad ...
  • 1 篇 genkin daniel

语言

  • 172 篇 英文
  • 10 篇 其他
  • 9 篇 中文
检索条件"主题词=RSA algorithm"
191 条 记 录,以下是41-50 订阅
排序:
Framework of an Optimized rsa Scheme for IoT Authentication Threat Detection and Elimination  2nd
Framework of an Optimized RSA Scheme for IoT Authentication ...
收藏 引用
2nd International Conference on Cyber Intelligence and Information Retrieval, CIIR 2023
作者: Dahiya, Prachi Kumar, Vinod Delhi Technological University New Delhi India
IoT is a network of multiple electronic smart devices which are connected over the internet sharing every kind of detail including sending and receiving of the data over a common interconnected network and it includes... 详细信息
来源: 评论
Orbital Satellite Communication Encryption algorithm Based on Elliptic Curve Cryptography algorithm
收藏 引用
Procedia Computer Science 2025年 259卷 873-879页
作者: Haojie Yuan Yulu Wang Gang Tang China Software Testing Center (MIIT Software and Integrated Circuit Promotion Center) Beijing China China Mobile Information Technology Co. Ltd. Beijing China
In orbital satellite communication systems, there is a large amount of user sensitive data. In order to ensure the security of the data, but also to ensure the data transmission rate, the general use of symmetric encr... 详细信息
来源: 评论
Influence of the Void Structure on Thermal Performance in HGM/ER Composites
收藏 引用
ENERGIES 2025年 第8期18卷 2073-2073页
作者: Ding, Yu Dong, Zhaoyan Xu, Hong Ma, Zhe Zhai, Gangjun Dalian Univ Technol Deepwater Engn Res Ctr Dalian 116024 Peoples R China China Construct Fifth Div Installat Engn Co Ltd Shenzhen 518118 Peoples R China
The heat transfer mechanism of hollow glass microsphere/epoxy resin composites (HGM/ER) is intricate, and the formation of void structures during material preparation complicates the prediction of thermal conductivity... 详细信息
来源: 评论
A security enhanced robust audio steganography algorithm for image hiding using sample comparison in discrete wavelet transform domain and rsa encryption
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2017年 第22期76卷 24091-24106页
作者: El-Khamy, Said E. Korany, Noha O. El-Sherif, Marwa H. Alexandria Univ Dept Elect Engn Alexandria 21544 Egypt
Steganography is the technique of hiding any secret information like text, image or video behind a cover file. Audio steganography is one of the widespread data hiding techniques that embeds secret data in audio signa... 详细信息
来源: 评论
Research on Cache Timing Attack Against rsa with Sliding Window Exponentiation algorithm
收藏 引用
INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING 2016年 第2期8卷 88-95页
作者: Chen, Caisen Xiang, Yangxia DengLiu, Yuqin Zhou, Zeyun Acad Armored Forces Engn Minist Sci Res Beijing Peoples R China Acad Armored Forces Engn Dept Informat Engn Beijing Peoples R China
The vulnerabilities of the rsa cryptographic algorithm are analyzed, and it is not securely implemented. As the simultaneous multithreading could enable multiple execution threads to share the execution resources of a... 详细信息
来源: 评论
Chaotic System Image Encryption algorithm Base rsa  1
收藏 引用
13th International Conference on Computer Engineering and Networks (CENet)
作者: Zhao, Fuzhe Guo, Junnan Xu, Han Cent China Normal Univ Sch Comp Wuhan Peoples R China
Aiming at the limitation of one-dimensional Chebyshev chaotic map, an improved two-dimensional Chebyshev chaotic map is proposed. This map makes its structure more complex by extending the original one-dimensional map... 详细信息
来源: 评论
Modified Trial Division algorithm Using KNJ-Factorization Method To Factorize rsa Public Key Encryption
Modified Trial Division Algorithm Using KNJ-Factorization Me...
收藏 引用
proc 2014 inter conf contemporary comp informatics (ic3i)
作者: Lal, Nidhi Singh, Anurag Prakash Kumar, Shishupal Indian Inst Informat Technol Wireless Commun & Comp Allahabad Uttar Pradesh India
The security of rsa algorithm depends upon the positive integer N, which is the multiple of two precise large prime numbers. Factorization of such great numbers is a problematic process. There are many algorithms has ... 详细信息
来源: 评论
Enhancing the Data Security in Cloud by Implementing Hybrid (rsa & Aes) Encryption algorithm
Enhancing the Data Security in Cloud by Implementing Hybrid ...
收藏 引用
International Conference on Power, Automation and Communication (INPAC)
作者: Mahalle, Vishwanath S. Shahade, Aniket K. Shri Sant Gajanan Maharaj Coll Engn Dept Comp Sci & Engn Shegaon Maharashtra India Shri Sant Gajanan Maharaj Coll Engn Dept Informat Technol Shegaon Maharashtra India
This paper presents Hybrid (rsa & AES) encryption algorithm to safeguard data security in Cloud. Security being the most important factor in cloud computing has to be dealt with great precautions. This paper mainl... 详细信息
来源: 评论
DES-Co-rsa: A Hybrid Encryption algorithm Based on des and rsa  3
DES-Co-RSA: A Hybrid Encryption Algorithm Based on des and R...
收藏 引用
3rd IEEE International Conference on Power, Electronics and Computer Applications, ICPECA 2023
作者: Zhao, Jingjing North China Electric Power University Department of Computer Science and Engineering Baoding China
The Internet is developing rapidly, which leads to a sharp increase in information transmitted by the network. Moreover, people have a higher demand for encrypting meetings and encrypting information transmission. Cur... 详细信息
来源: 评论
Implementation of rsa Cryptoprocessor Based on Montgomery algorithm
Implementation of RSA Cryptoprocessor Based on Montgomery Al...
收藏 引用
1998 5th International Conference on Solid-State and Integrated Circuit Technology
作者: Deng Yuliang Mao Zhigang Ye Yizheng Wang Tao Harbin Institute of Technology
rsa algorithm is a main method to implement public key *** the basis that the Montgomery algorithm can modular-multiply in a fast way,this paper presents a hardware implementation of 1024-bit rsa *** has been shown th... 详细信息
来源: 评论