Works matching DE "RSA algorithm"
Results: 493
ECC Based Secure Sharing of Healthcare Data in the Health Cloud Environment.
- Published in:
- Wireless Personal Communications, 2019, v. 108, n. 2, p. 1021, doi. 10.1007/s11277-019-06450-7
- By:
- Publication type:
- Article
Radial Sub-band Allocation with Downlink Interference Mitigation in Macro–Femto Environment.
- Published in:
- Wireless Personal Communications, 2019, v. 106, n. 2, p. 955, doi. 10.1007/s11277-019-06198-0
- By:
- Publication type:
- Article
VANET Based p-RSA Scheduling Algorithm Using Dynamic Cloud Storage.
- Published in:
- Wireless Personal Communications, 2018, v. 98, n. 4, p. 3527, doi. 10.1007/s11277-017-5027-0
- By:
- Publication type:
- Article
Provable Identity Based User Authentication Scheme on ECC in Multi-server Environment.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 3, p. 2785, doi. 10.1007/s11277-017-3961-5
- By:
- Publication type:
- Article
( t, n) Multi-Secret Sharing Scheme Based on Bivariate Polynomial.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 2, p. 1495, doi. 10.1007/s11277-016-3862-z
- By:
- Publication type:
- Article
Analysis and Design of Protocol for Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers.
- Published in:
- Wireless Personal Communications, 2015, v. 80, n. 3, p. 1281, doi. 10.1007/s11277-014-2087-2
- By:
- Publication type:
- Article
Rumor Riding: An Anonymity Approach for Decentralized Peer to Peer Systems.
- Published in:
- Wireless Personal Communications, 2014, v. 79, n. 1, p. 647, doi. 10.1007/s11277-014-1878-9
- By:
- Publication type:
- Article
A Secure and Efficient Authentication Scheme for E-coupon Systems.
- Published in:
- Wireless Personal Communications, 2014, v. 77, n. 4, p. 2981, doi. 10.1007/s11277-014-1680-8
- By:
- Publication type:
- Article
改进的蒙哥马利模乘算法及FPGA实现.
- Published in:
- Electronic Science & Technology, 2022, v. 35, n. 7, p. 58, doi. 10.16180/j.cnki.issn1007-7820.2022.07.010
- By:
- Publication type:
- Article
INTEGRAÇÃO ESCALÁVEL E SEGURA DE SISTEMAS DE GESTÃO COM APIS: UMA ABORDAGEM PRÁTICA.
- Published in:
- Revista Foco (Interdisciplinary Studies Journal), 2025, v. 18, n. 2, p. 1, doi. 10.54751/revistafoco.v18n2-098
- By:
- Publication type:
- Article
THE CONCEPT FOR THE E-VOTING SYSTEM USING BLOCKCHAIN TECHNOLOGY.
- Published in:
- i-Manager's Journal On Cloud Computing, 2020, v. 7, n. 2, p. 28, doi. 10.26634/jcc.7.2.18145
- By:
- Publication type:
- Article
Karatsuba Algorithm: Parallelization using CUDA.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2,Part 5, p. 6022
- By:
- Publication type:
- Article
Multilayer Security using RSA Cryptography and Video Steganography.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2019, v. 5, p. 131
- By:
- Publication type:
- Article
Two Level Fingerprint Privacy using RSA.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2017, v. 3, n. 3, p. 125
- By:
- Publication type:
- Article
Enhancing the Security of Classical Communication with Post-Quantum Authenticated-Encryption Schemes for the Quantum Key Distribution.
- Published in:
- Computers (2073-431X), 2024, v. 13, n. 7, p. 163, doi. 10.3390/computers13070163
- By:
- Publication type:
- Article
ПРОЕКТУВАННЯ ЗАХИСНИХ СИСТЕМ НА БАЗІ ФРАКТАЛЬНИХ АЛГОРИТМІВ.
- Published in:
- Automation of Technological & Business Processes / Avtomatizaciâ Tehnologiceskih i Biznes-Processov, 2021, v. 13, n. 2, p. 41
- By:
- Publication type:
- Article
Study on hierarchical encryption of information of digital library.
- Published in:
- Journal of Zhengzhou University of Light Industry, Natural Science Edition, 2014, v. 29, n. 3, p. 105, doi. 10.3969/j.issn.2095-476X.2014.03.024
- By:
- Publication type:
- Article
МЕТОД ПРОВЕДЕННЯ ГОЛОСУВАННЯ СЕРЕД ВЛАСНИКІВ АКЦІЙ НА БЛОКЧЕЙНІ, ВИКОРИСТОВУЮЧИ КРИПТОСИСТЕМУ ПЕЙЕ ТА РОЗПОДІЛЕНУ ГЕНЕРАЦІЮ КЛЮЧІВ
- Published in:
- Ukrainian Scientific Journal of Information Security, 2019, v. 25, n. 2, p. 82, doi. 10.18372/2225-5036.25.13839
- By:
- Publication type:
- Article
SYNTHESIS OF СRYPTORESISTANT GENERATORS OF PSEUDORANDOM NUMBERS BASED ON GENERALIZED GALOIS AND FIBONACCI MATRIXES.
- Published in:
- Radio Electronics, Computer Science, Control, 2019, n. 3, p. 86, doi. 10.15588/1607-3274-2019-3-10
- By:
- Publication type:
- Article
Secure AIS with Identity-Based Authentication and Encryption.
- Published in:
- TransNav: International Journal on Marine Navigation & Safety of Sea Transportation, 2020, v. 14, n. 2, p. 287, doi. 10.12716/1001.14.02.03
- By:
- Publication type:
- Article
Protected AIS: A Demonstration of Capability Scheme to Provide Authentication and Message Integrity.
- Published in:
- TransNav: International Journal on Marine Navigation & Safety of Sea Transportation, 2020, v. 14, n. 2, p. 279, doi. 10.12716/1001.14.02.02
- By:
- Publication type:
- Article
Improving the RSA Encryption for Images by Introducing DNA Sequence Encoding.
- Published in:
- Engineering, Technology & Applied Science Research, 2024, v. 14, n. 6, p. 17786, doi. 10.48084/etasr.8557
- By:
- Publication type:
- Article
Secure Data Encryption Through a Combination of AES, RSA and HMAC.
- Published in:
- Engineering, Technology & Applied Science Research, 2017, v. 7, n. 4, p. 1781, doi. 10.48084/etasr.1272
- By:
- Publication type:
- Article
Timed-release encryption anonymous interaction protocol based on smart contract.
- Published in:
- Journal of Cloud Computing (2192-113X), 2024, v. 13, n. 1, p. 1, doi. 10.1186/s13677-023-00536-1
- By:
- Publication type:
- Article
LRSA-Hybrid Encryption Method Using Linear Cipher and RSA Algorithm to Conceal the Text Messages.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 11, p. 1164, doi. 10.14569/ijacsa.2024.01511114
- By:
- Publication type:
- Article
Hybrid Algorithm using Rivest-Shamir-Adleman and Elliptic Curve Cryptography for Secure Email Communication.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2024, v. 15, n. 4, p. 1037, doi. 10.14569/ijacsa.2024.01504105
- By:
- Publication type:
- Article
Secure Cloud Approach Based on Okamoto-Uchiyama Cryptosystem.
- Published in:
- Journal of Applied Computer Science & Mathematics, 2020, v. 14, n. 29, p. 9, doi. 10.4316/JACSM.202001001
- By:
- Publication type:
- Article
SECURING COMMUNICATION IN CHATTER APPLICATION.
- Published in:
- Annals of DAAAM & Proceedings, 2021, v. 32, p. 90, doi. 10.2507/32nd.daaam.proceedings.013
- By:
- Publication type:
- Article
A New RSA Image Encryption Algorithm Based on Singular Value Decomposition.
- Published in:
- International Journal of Pattern Recognition & Artificial Intelligence, 2019, v. 33, n. 1, p. N.PAG, doi. 10.1142/S0218001419540028
- By:
- Publication type:
- Article
A Fast Parallel Modular Exponentiation Algorithm.
- Published in:
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2018, v. 43, n. 2, p. 903, doi. 10.1007/s13369-017-2797-3
- By:
- Publication type:
- Article
A Novel Lightweight Authentication Scheme for Mobile Ad Hoc Networks.
- Published in:
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2012, v. 37, n. 8, p. 2179, doi. 10.1007/s13369-012-0318-y
- By:
- Publication type:
- Article
CYBERGUARD: A FORTIFIED MESSAGE AUTHENTICATION PROTOCOL WITH DIGITAL SIGNATURES IN NS-2 SIMULATION ENVIRONMENT.
- Published in:
- Scalable Computing: Practice & Experience, 2025, v. 26, n. 1, p. 114, doi. 10.12694/scpe.v26i1.3670
- By:
- Publication type:
- Article
AN ENHANCED RSA ALGORITHM TO COUNTER REPETITIVE CIPHERTEXT THREATS EMPOWERING USER-CENTRIC SECURITY.
- Published in:
- Scalable Computing: Practice & Experience, 2024, v. 25, n. 6, p. 4669, doi. 10.12694/scpe.v25i6.3386
- By:
- Publication type:
- Article
HAZARDOUS CHEMICALS LOGISTICS INTERNET OF VEHICLES BASED ON ENCRYPTION ALGORITHM.
- Published in:
- Scalable Computing: Practice & Experience, 2024, v. 25, n. 3, p. 1287, doi. 10.12694/scpe.v25i3.2064
- By:
- Publication type:
- Article
A novel development to encrypt data communication under t-intuitionistic fuzzy environment.
- Published in:
- PLoS ONE, 2024, v. 19, n. 9, p. 1, doi. 10.1371/journal.pone.0308140
- By:
- Publication type:
- Article
E2EE enhanced patient-centric blockchain-based system for EHR management.
- Published in:
- PLoS ONE, 2024, v. 19, n. 4, p. 1, doi. 10.1371/journal.pone.0301371
- By:
- Publication type:
- Article
A hybrid meta-heuristic approach for optimization of routing and spectrum assignment in Elastic Optical Network (EON).
- Published in:
- Enterprise Information Systems, 2021, v. 15, n. 7, p. 911, doi. 10.1080/17517575.2019.1710262
- By:
- Publication type:
- Article
An improved anti-quantum MST<sub>3</sub> public key encryption scheme for remote sensing images.
- Published in:
- Enterprise Information Systems, 2021, v. 15, n. 4, p. 530, doi. 10.1080/17517575.2019.1600040
- By:
- Publication type:
- Article
CK-RAID: Collaborative Knowledge Repository for Intrusion Detection System.
- Published in:
- Journal of Computing & Information Technology, 2019, v. 27, n. 2, p. 29, doi. 10.20532/cit.2019.1004706
- By:
- Publication type:
- Article
A STUDY AND COMPARISON OF THE VARIOUS CRYPTOGRAPHY TECHNIQUE STANDARDS WITHIN FIFTEEN FACTORS.
- Published in:
- i-Manager's Journal on Digital Forensics & Cyber Security (JDF), 2023, v. 1, n. 1, p. 21, doi. 10.26634/jdf.1.1.19134
- By:
- Publication type:
- Article
SECURE AND EFFICIENT DATA TRANSFER IN AODV ROUTING PROTOCOL USING RSA ENCRYPTION.
- Published in:
- i-Manager's Journal on Digital Forensics & Cyber Security (JDF), 2023, v. 1, n. 1, p. 1, doi. 10.26634/jdf.1.1.19389
- By:
- Publication type:
- Article
Sustainable Business Models for Innovative Urban Mobility Services.
- Published in:
- World Electric Vehicle Journal, 2024, v. 15, n. 9, p. 420, doi. 10.3390/wevj15090420
- By:
- Publication type:
- Article
Post-quantum cryptography-driven security framework for cloud computing.
- Published in:
- Open Computer Science, 2022, v. 12, n. 1, p. 142, doi. 10.1515/comp-2022-0235
- By:
- Publication type:
- Article
FPGA design and implementation for montgomery multiplication algorithm using MATLAB HDL coder.
- Published in:
- Bulletin of the National Research Centre, 2024, v. 48, n. 1, p. 1, doi. 10.1186/s42269-024-01285-0
- By:
- Publication type:
- Article
CRYPTANALYSIS OF RSA-LIKE CRYPTOSYSTEM WITH MODULUS N = pq AND ed ≡ 1(mod (p² + p + 1)(q² + q + 1)).
- Published in:
- South East Asian Journal of Mathematics & Mathematical Sciences, 2021, v. 17, n. 3, p. 1
- By:
- Publication type:
- Article
Improving the Robustness of RSA Encryption Through Input-Based Key Generation.
- Published in:
- Mathematical Modelling of Engineering Problems, 2024, v. 11, n. 1, p. 217, doi. 10.18280/mmep.110124
- By:
- Publication type:
- Article
Analytical Method to Compute the Cloud Computing Data Security Issues by Using Encryption Algorithms.
- Published in:
- EAI Endorsed Transactions on Scalable Information Systems, 2020, v. 7, n. 28, p. 1, doi. 10.4108/eai.13-7-2018.164555
- By:
- Publication type:
- Article
A Fast and Secure RSA Public Key Cryptosystem.
- Published in:
- Journal of Mathematical Extension, 2020, v. 14, n. 4, p. 1
- By:
- Publication type:
- Article
集群式农产品供应链区块链密文策略可验多部门监管方案.
- Published in:
- Transactions of the Chinese Society of Agricultural Engineering, 2023, v. 39, n. 3, p. 227, doi. 10.11975/j.issn.1002-6819.202210089
- By:
- Publication type:
- Article
Hybrid encryption prototype combining AES and RSA encryption methods.
- Published in:
- Revista Vínculos, 2023, v. 20, n. 1, p. 1
- By:
- Publication type:
- Article