Добірка наукової літератури з теми "Asymmetric encryption methods"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Asymmetric encryption methods".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Asymmetric encryption methods"
Luo, Guangchun, Ningduo Peng, Ke Qin, and Aiguo Chen. "A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods." Scientific World Journal 2014 (2014): 1–16. http://dx.doi.org/10.1155/2014/153791.
Повний текст джерелаAbdElminaam, DiaaSalama, Hatem M. Abdul Kader, Mohie M. Hadhoud, and Salah M. El-Sayed. "Developing and Evaluation of New Hybrid Encryption Algorithms." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 1 (March 28, 2014): 4038–52. http://dx.doi.org/10.24297/ijct.v13i1.2926.
Повний текст джерелаYayla, Rıdvan, Hakan Üçgün, and Sefa Tunçer. "A Research on Encryption Methods and Account Security." Academic Perspective Procedia 3, no. 1 (October 25, 2020): 385–94. http://dx.doi.org/10.33793/acperpro.03.01.81.
Повний текст джерелаNagavalli, S., and G. Ramachandran. "A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryption Scheme." International Journal of Advances in Applied Sciences 7, no. 4 (December 1, 2018): 369. http://dx.doi.org/10.11591/ijaas.v7.i4.pp369-376.
Повний текст джерелаSa'adah, Nihayatus, I. Gede Puja Astawa, and Amang Sudarsono. "Trusted Data Transmission Using Data Scrambling Security Method with Asymmetric Key Algorithm for Synchronization." EMITTER International Journal of Engineering Technology 6, no. 2 (December 29, 2018): 217–35. http://dx.doi.org/10.24003/emitter.v6i2.267.
Повний текст джерелаHOOBI, Mays M. "SURVEY: EFFICIENT HYBRID ALGOR ITHMS OF CRYPTOGRAPHY." MINAR International Journal of Applied Sciences and Technology 2, no. 4 (December 1, 2020): 1–16. http://dx.doi.org/10.47832/2717-8234.4-2.1.
Повний текст джерелаManiyath, Shima Ramesh, and Thanikaiselvan V. "A novel efficient multiple encryption algorithm for real time images." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 2 (April 1, 2020): 1327. http://dx.doi.org/10.11591/ijece.v10i2.pp1327-1336.
Повний текст джерелаZhu, Maoran, and Xin Liu. "Study on Internet Finance Credit Information Sharing Based on Block Chain Technology." Asian Social Science 14, no. 2 (January 29, 2018): 81. http://dx.doi.org/10.5539/ass.v14n2p81.
Повний текст джерелаSafira, Maria Okta, and I. Komang Ari Mogi. "Design Of Hybrid Cryptography With Vigenere Cipher And RSA Algorithm On IOT Data Security." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 8, no. 4 (February 4, 2020): 475. http://dx.doi.org/10.24843/jlk.2020.v08.i04.p14.
Повний текст джерелаKotukh, E. V., O. V. Severinov, A. V. Vlasov, L. S. Kozina, A. O. Tenytska, and E. O. Zarudna. "Methods of construction and properties of logariphmic signatures." Radiotekhnika, no. 205 (July 2, 2021): 94–99. http://dx.doi.org/10.30837/rt.2021.2.205.09.
Повний текст джерелаДисертації з теми "Asymmetric encryption methods"
Квітка, Олександр Вячеславович. "Алгоритмічно-програмний метод асиметричного шифрування даних". Master's thesis, КПІ ім. Ігоря Сікорського, 2021. https://ela.kpi.ua/handle/123456789/46637.
Повний текст джерелаThis master's dissertation is devoted to the development and implementation of the method of asymmetric data encryption. The dissertation analyzes the existing methods of asymmetric encryption, defines the requirements for the developed method, substantiates the most appropriate asymmetric encryption method RSA and based on it developed the asymmetric encryption method. This method differs from the existing ones by using a compound module consisting of prime numbers, the number of which is approximately equal to "1" /"25" of the length of the module, combined with the consequence of the Chinese Remainder theorem, which reduces computational complexity exponentially proportional to increase the length of the encryption module. The practical value of the results obtained in this work is that the proposed method of asymmetric encryption has reduced computational complexity compared to existing methods for module lengths over 10 thousand bits. In this master's dissertation a software module of encryption based on the proposed modified method and software for studying the computational complexity of encryption methods have been developed.
Частини книг з теми "Asymmetric encryption methods"
Tharakan, Linoy A., Sherly Daniel, and R. Dhanasekaran. "Security Enhancement and Monitoring for Data Sensing Networks Using a Novel Asymmetric Mirror-Key Data Encryption Method." In Studies in Big Data, 65–78. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-4412-9_3.
Повний текст джерелаJayapandian N. "Threats and Security Issues in Smart City Devices." In Secure Cyber-Physical Systems for Smart Cities, 220–50. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7189-6.ch009.
Повний текст джерелаJayapandian N. "Threats and Security Issues in Smart City Devices." In Research Anthology on Artificial Intelligence Applications in Security, 1230–51. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch055.
Повний текст джерелаJayapandian N. "Threats and Security Issues in Smart City Devices." In Research Anthology on Artificial Intelligence Applications in Security, 1230–51. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch055.
Повний текст джерелаAl-Hamdani, Wasim A. "E-Mail, Web Service and Cryptography." In Applied Cryptography for Cyber Security and Defense, 52–78. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-61520-783-1.ch003.
Повний текст джерелаChander, Bhanu. "The State-of-the-Art Cryptography Techniques for Secure Data Transmission." In Handbook of Research on Intrusion Detection Systems, 284–305. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2242-4.ch014.
Повний текст джерелаWilson, Robin. "6. From cards to cryptography." In Number Theory: A Very Short Introduction, 97–111. Oxford University Press, 2020. http://dx.doi.org/10.1093/actrade/9780198798095.003.0006.
Повний текст джерелаHe, Fan, Zhengquan Ang, Guanglun Yang, Qingqin Fu, Ling Yi, Pingjiang Xu, Jia Liu, Zhaoqing Liang, Changsheng Niu, and Jianying Chen. "A Master Station and Terminal Data Exchange Method Based on Symmetric and Asymmetric Algorithms." In Proceedings of CECNet 2021. IOS Press, 2021. http://dx.doi.org/10.3233/faia210426.
Повний текст джерелаPramanik, Sabyasachi, Ramkrishna Ghosh, Mangesh M. Ghonge, Vipul Narayan, Mudita Sinha, Digvijay Pandey, and Debabrata Samanta. "A Novel Approach Using Steganography and Cryptography in Business Intelligence." In Advances in Business Information Systems and Analytics, 192–217. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5781-5.ch010.
Повний текст джерелаHelal Ahmed, Md, Jagmohan Tanti, and Sumant Pushp. "A Public Key Cryptosystem Using Cyclotomic Matrices." In Coding Theory - Recent Advances, New Perspectives and Applications [Working Title]. IntechOpen, 2021. http://dx.doi.org/10.5772/intechopen.101105.
Повний текст джерелаТези доповідей конференцій з теми "Asymmetric encryption methods"
Damasceno, Kayque, Carlos Cruz, Anderson De Oliveira, and Luís De Castro. "Alternative N-bit Key Data Encryption for Block Ciphers." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação, 2019. http://dx.doi.org/10.5753/sbseg.2019.13990.
Повний текст джерелаKrishna Rao, Akula Vamsi, V. N. Aditya Datta Chivukula, Sri Keshava Reddy Adupala, and Abhiram Reddy Cholleti. "Multi-Layer Encryption Algorithm." In 7th International Conference on VLSI and Applications (VLSIA 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.112103.
Повний текст джерелаBabenko, M., E. Shiriaev, A. Tchernykh, and E. Golimblevskaia. "Neural network method for base extension in residue number system." In The International Workshop on Information, Computation, and Control Systems for Distributed Environments. Crossref, 2020. http://dx.doi.org/10.47350/iccs-de.2020.01.
Повний текст джерелаGil, Sang-Keun, Seok-Hee Jeon, Jong-Rae Jung, and Nam Kim. "Asymmetric public key cryptosystem using digital holographic encryption method." In Practical Holography XXXIV: Displays, Materials, and Applications, edited by Hans I. Bjelkhagen. SPIE, 2020. http://dx.doi.org/10.1117/12.2548289.
Повний текст джерелаTan, Huashan, and Yang Yang. "A Software Protection Method Based On Computer Fingerprint And Asymmetric Encryption." In 2nd International Conference on Computer and Information Applications (ICCIA 2012). Paris, France: Atlantis Press, 2012. http://dx.doi.org/10.2991/iccia.2012.314.
Повний текст джерелаAmetepe, Adote Francois-Xavier, Semevo Arnaud R. M. Ahouandjinou, and Eugene C. Ezin. "Secure Encryption by Combining Asymmetric and Symmetric Cryptographic Method for Data Collection WSN in smart Agriculture." In 2019 IEEE International Smart Cities Conference (ISC2). IEEE, 2019. http://dx.doi.org/10.1109/isc246665.2019.9071658.
Повний текст джерелаShi, Zhangyue, Chenang Liu, Chen Kan, Wenmeng Tian, and Yang Chen. "A Blockchain-Enabled Approach for Online Stream Sensor Data Protection in Cyber-Physical Manufacturing Systems." In ASME 2021 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2021. http://dx.doi.org/10.1115/detc2021-72023.
Повний текст джерелаZhang, Chenggong, Wenqi He, Zewei Cai, and Xiang Peng. "Generalized amplitude-phase retrieval algorithm attack on 'double images encryption method with resistance against the special attack based on an asymmetric algorithm'." In SPIE Optical Engineering + Applications, edited by Khan M. Iftekharuddin, Abdul A. S. Awwal, Mireya García Vázquez, Andrés Márquez, and Mohammad A. Matin. SPIE, 2016. http://dx.doi.org/10.1117/12.2236277.
Повний текст джерела