Výsledky vyhledávání - "asymmetric encryption/decryption algorithm"
-
1
Ensuring Cybersecurity of Data Transmission in Limited Energy Consumption Networks
Vydáno: IEEE 06.10.2020Vydáno v 2020 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon) (06.10.2020)“…In the northern gas fields, most data are transmitted via wireless networks, which requires special transmission security measures. Herewith, the gas field…”
Získat plný text
Konferenční příspěvek -
2
Enhanced post-quantum key escrow system for supervised data conflict of interest based on consortium blockchain
ISSN: 1382-6905, 1573-2886Vydáno: United States Springer US 01.01.2023Vydáno v Journal of combinatorial optimization (01.01.2023)“… However, current key escrow schemes rely on vulnerable traditional asymmetric encryption/decryption algorithms…”
Získat plný text
Journal Article -
3
A Data Encryption Solution for Mobile Health Apps in Cooperation Environments
ISSN: 1438-8871, 1439-4456, 1438-8871Vydáno: Canada Journal of Medical Internet Research 01.04.2013Vydáno v Journal of medical Internet research (01.04.2013)“…Mobile Health (mHealth) proposes health care delivering anytime and anywhere. It aims to answer several emerging problems in health services, including the…”
Získat plný text
Journal Article -
4
RETRACTED ARTICLE: Enhanced post-quantum key escrow system for supervised data conflict of interest based on consortium blockchain
ISSN: 1382-6905, 1573-2886Vydáno: New York Springer US 01.07.2023Vydáno v Journal of combinatorial optimization (01.07.2023)“… However, current key escrow schemes rely on vulnerable traditional asymmetric encryption/decryption algorithms…”
Získat plný text
Journal Article -
5
Polynomial Rabin Cryptosystem Based on the Operation of Addition
ISBN: 9781665410496, 1665410493ISSN: 2770-5218Vydáno: IEEE 26.09.2022Vydáno v International Conference on Advanced Computer Information Technologies (Print) (26.09.2022)“…The analysis of the existing asymmetric encryption / decryption algorithms is carried out, their advantages and disadvantages are determined on the basis of this analysis in the paper…”
Získat plný text
Konferenční příspěvek -
6
Concurrent error detection and correction in dual basis multiplier over GF(2 m )
ISSN: 1751-858X, 1751-8598Vydáno: Stevenage Institution of Engineering and Technology 01.02.2009Vydáno v IET circuits, devices & systems (01.02.2009)“…Fault-based side-channel cryptanalysis is a useful technique against symmetrical and asymmetrical encryption/decryption algorithms…”
Získat plný text
Journal Article

