Výsledky vyhledávání - "rsa algorithm"
-
1
An efficient CRT-RSA algorithm secure against power and fault attacks
ISSN: 0164-1212, 1873-1228Vydáno: New York Elsevier Inc 01.10.2011Vydáno v The Journal of systems and software (01.10.2011)“… ► Our CRT-RSA algorithm has a guarantee that requires no knowledge of the public exponent…”
Získat plný text
Journal Article -
2
Experimental Evaluation of an On-line RSA Algorithm for SDN-Controlled Optical Metro Networks with VCSEL-based S-BVTs
Vydáno: IFIP 01.05.2020Vydáno v 2020 International Conference on Optical Network Design and Modeling (ONDM) (01.05.2020)“…Upcoming metro networks are required to transport huge and highly dynamic data traffic whilst resulting cost and power efficient. Thus, novel metro network…”
Získat plný text
Konferenční příspěvek -
3
Secure Intrusion Detection System in Mobile Ad Hoc Networks Using RSA Algorithm
Vydáno: IEEE 01.02.2017Vydáno v 2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM) (01.02.2017)“… In this paper we discuss intrusion detection system using public RSA algorithm…”
Získat plný text
Konferenční příspěvek -
4
Generation of Flash Containers in PDX Format for Automotive Secure Gateway
Vydáno: IEEE 24.10.2021Vydáno v 2021 IEEE Mysore Sub Section International Conference (MysuruCon) (24.10.2021)“… to as Electronic Control Units (ECUs). Vehicles that are linked to the Internet and therefore exposed to assault from afar have the potential to lose control, be injured, and subject to costly lawsuits…”
Získat plný text
Konferenční příspěvek -
5
The Quantum Computer and the Security of Information Systems
Vydáno: IEEE 21.09.2021Vydáno v 2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI) (21.09.2021)“…Many researchers and laboratories have been engaged for years in a competition for a single objective, which is the quantum computer. Recently, Google has…”
Získat plný text
Konferenční příspěvek -
6
Access Control System Based on Encryption in QR-Code Technology
ISBN: 9781538693391, 1538693399Vydáno: IEEE 01.09.2018Vydáno v 2018 IEEE 4th International Symposium on Wireless Systems Within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS SWS) (01.09.2018)“… The research goal was investigation of providing secure access control systems using cryptosystem based on RSA algorithm and pseudorandom number generator…”
Získat plný text
Konferenční příspěvek -
7
A faster modular multiplication algorithm
ISSN: 0020-7160, 1029-0265Vydáno: Abingdon Gordon and Breach Science Publishers 01.01.1991Vydáno v International journal of computer mathematics (01.01.1991)“…This paper describes a method for quickly computing AB mod N where N is odd. It is shown to have significant advantages over other algorithms which make it…”
Získat plný text
Journal Article -
8
A hybrid RSA-IPA optimizer for designing an artificial neural network to study the Jeffery-Hamel blood flow with copper nanoparticles: Application to stenotic tapering artery
ISSN: 2590-1230, 2590-1230Vydáno: Elsevier 01.12.2023Vydáno v Results in engineering (01.12.2023)“…). The initial weights are first updated using the RSA algorithm (maximum 20 iterations…”
Získat plný text
Journal Article -
9
Physical layer impairments aware routing and spectrum allocation algorithm for transparent flexible-grid optical networks
ISSN: 0140-3664, 1873-703XVydáno: Elsevier B.V 01.03.2020Vydáno v Computer communications (01.03.2020)“…In this paper, we discuss physical layer impairments (PLIs) aware routing and spectrum allocation (RSA…”
Získat plný text
Journal Article -
10
Poisson coefficient of open cellular solids subject to structural anisotropy
ISBN: 0002569288000ISSN: 0266-5751, 0022-2461, 1573-4803Vydáno: New York Springer Verlag 01.07.2008Vydáno v Journal of materials science (01.07.2008)“… A significant structural anisotropy is introduced by considering ellipsoid voids where their elongation and orientation are controlled using the random sequential addition (RSA) algorithm…”
Získat plný text
Journal Article -
11
Energy-Aware Framework for Assessing Cryptographic Algorithms in Wireless Sensor Networks
ISSN: 2661-8907, 2662-995X, 2661-8907Vydáno: Singapore Springer Nature Singapore 01.04.2025Vydáno v SN computer science (01.04.2025)“…Wireless sensor networks have found applications in several areas such as agriculture, healthcare, weather forecasting, and the Internet of Things. Due to…”
Získat plný text
Journal Article -
12
Energy Consumption Analysis of the Cryptographic Key Generation Process of RSA and ECC Algorithms in Embedded Systems
ISSN: 1548-0992, 1548-0992Vydáno: Los Alamitos IEEE 01.09.2014Vydáno v Revista IEEE América Latina (01.09.2014)“…A subject that is gaining more strength in technological scenario is the embedded system…”
Získat plný text
Journal Article -
13
Providing More Security to Data Stored in Multi-Cloud Environment Using Encryption and Decryption Techniques
ISSN: 2582-3930, 2582-3930Vydáno: 09.06.2025Vydáno v INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT (09.06.2025)“… The RSA algorithm is the method used to improve data security. Time complexity, space complexity, and throughput are the three main factors used to evaluate security performance…”
Získat plný text
Journal Article -
14
A Digital Signature System Based on Real Time Face Recognition
ISSN: 2470-640XVydáno: IEEE 01.10.2019Vydáno v IEEE International Conference on System Engineering and Technology (Online) (01.10.2019)“… The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents…”
Získat plný text
Konferenční příspěvek -
15
Multi-Factor Analysis of RSA Based on Variations in Primes Used for Modulus Generation
Vydáno: IEEE 08.09.2023Vydáno v 2023 3rd International Conference on Innovative Sustainable Computational Technologies (CISCT) (08.09.2023)“…The RSA cryptosystem encompasses some of the most common and popular encryption-decryption algorithms. In conjunction with other encryption schemes, RSA…”
Získat plný text
Konferenční příspěvek -
16
PMU-Based Power System Stabilizer Design Using Reptile Search Algorithm
Vydáno: IEEE 24.10.2022Vydáno v 2022 IEEE International Conference on Automation/XXV Congress of the Chilean Association of Automatic Control (ICA-ACCA) (24.10.2022)“… This paper proposes a controller design method using the Reptile Search Algorithm (RSA) algorithm considering robustness to multiple loss of information in the communication channels in the design stage…”
Získat plný text
Konferenční příspěvek -
17
Rediscovering Mathematics: You Do the Math
ISBN: 0883857804, 9780883857809, 9780883857700, 0883857707Vydáno: Washington, D.C. Mathematical Association of America 01.01.2011“… Rediscovering Mathematics provides a fresh view of mathematics for those who already like the subject, and offers a second chance for those who think they don’t…”
Získat plný text
E-kniha Kniha -
18
Enhancing Post-Quantum Cryptography: Exploring Mathematical Foundations and Comparative Analysis of Different Cryptographic Algorithm
ISSN: 2321-9653, 2321-9653Vydáno: 31.08.2023Vydáno v International journal for research in applied science and engineering technology (31.08.2023)“… The study then transitions to contemporary subjects. Elliptic Curves and Cryptography are investigated, showcasing their significance in secure communication…”
Získat plný text
Journal Article -
19
A secure handshaking aodv routing protocol (SHS-AODV)
ISBN: 1538630389, 9781538630389Vydáno: IEEE 01.03.2018Vydáno v 2018 4th International Conference on Recent Advances in Information Technology (RAIT) (01.03.2018)“… The security of such framework is a fundamental subject. This study, we have presented the most known protocols, routing limit in MANETs for securing…”
Získat plný text
Konferenční příspěvek -
20
RSA ve RC4 algoritmalarının performans karşılaştırması
ISSN: 2564-6397Vydáno: Altınbaş Üniversitesi 2021Vydáno v Aurum Mühendislik Sistemleri ve Mimarlık Dergisi (A-JESA) (2021)“…Günümüzde bilgi teknolojileri sistemlerinin en önemli çalışma alanlarından biri güvenliktir. İletişim teknolojilerinin hızla gelişmesi, bilgi güvenliği…”
Získat plný text
Journal Article

