Showing 1 - 20 results of 71 for search '"RSA (algorithm)"', query time: 0.11s Refine Results
  1. 1

    ACTIVE NETWORK SECURITY BASED RSA ALGORITHM by Ahmed Freidoon Fadhil, Wisam haitham abbood

    Published 2009-12-01
    “…The proposed system depends on the basic concepts (authentication and authorization) and uses RSA algorithm to add additional level of security. The proposed system also depends on active packet architecture, the packet will represented in the active node as input, and when the packet is retransmitted to another active node it carries information about each node it visits. …”
    Get full text
    Article
  2. 2

    Enhancement of System Security by Using LSB and RSA Algorithms by Muna M. Hummady, Ameer Hussein Morad

    Published 2022-03-01
    “…In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography. …”
    Get full text
    Article
  3. 3

    Constellation Encryption Design Based on Chaotic Sequence and the RSA Algorithm by Mengjiao Quan, Qiang Jin, Bin Ba, Jin Zhang, Chunxiao Jian

    Published 2022-10-01
    “…The specific method is to first use the asymmetric RSA algorithm to transmit the system parameters, then to use the initial value sensitivity of the chaotic sequence to generate the secret sequence, and finally to use the secret sequence to encrypt the original sequence. …”
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    RSA algorithm using key generator ESRKGS to encrypt chat messages with TCP/IP protocol by Aminudin Aminudin, Gadhing Putra Aditya, Sofyan Arifianto

    Published 2020-04-01
    “…This study aims to analyze the performance and security of the RSA algorithm in combination with the key generation method of enhanced and secured RSA key generation scheme (ESRKGS). …”
    Get full text
    Article
  7. 7

    An improved random bit-stuffing technique with a modified RSA algorithm for resisting attacks in information security (RBMRSA) by Falowo O. Mojisola, Sanjay Misra, C. Falayi Febisola, Olusola Abayomi-Alli, Gokhan Sengul

    Published 2022-07-01
    “…The encryption algorithms include a well-known RSA algorithm (1024 key length) with an enhanced bit insertion algorithm to enhance the security of RSA against different attacks. …”
    Get full text
    Article
  8. 8

    Analisis dan Implementasi Algoritma Asimetris Dual Modulus RSA (DM-RSA) pada Aplikasi Chat by Aminudin, Ilyas Nuryasin

    Published 2021-08-01
    Subjects: “…rsa algorithm, dual modulus rsa, kraitchik factorization…”
    Get full text
    Article
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    The Design of a Safe Charging System Based on PKS Architecture by Jianhong Zeng, Yi Zhang, Youhua Xue, Wenqi Li, Jing Li, Linchao Zhang, Shipu Zheng

    Published 2022-10-01
    Subjects: “…Rivest Shamir Adleman (RSA) algorithm…”
    Get full text
    Article
  17. 17

    Mechanical engineering design optimization using reptile search algorithm by Milenković Branislav, Jovanović Đorđe, Krstić Mladen

    Published 2022-01-01
    “…In this paper we have demonstrated how the Reptile Search Algorithm (RSA) algorithm is able to solve classical engineering design problems. …”
    Get full text
    Article
  18. 18

    Dynamic Routing and Spectrum Assignment Based on the Consecutive Sub-Channels in Flexible-Grid Optical Networks by Varsha Lohani, Anjali Sharma, Yatindra Nath Singh

    Published 2022-01-01
    “…This makes the Routing and Spectrum Assignment (RSA) algorithms in Flexible Grid Optical Networks more challenging. …”
    Get full text
    Article
  19. 19

    Computer cyberspace security mechanism supported by cloud computing. by ZeYuan Fu

    Published 2022-01-01
    “…Finally, combined with Rivest Shamir Adleman (RSA) algorithm, this work proposes a CC network-oriented data encryption technology, selects different data sets for different models, and tests each model through design experiments. …”
    Get full text
    Article
  20. 20

    Proposal Framework to Light Weight Cryptography Primitives by Mustafa Abd Zaid, Soukaena Hassan

    Published 2022-04-01
    “…Rivest–Shamir–Adleman (RSA) algorithm is used to produce a lightweight asymmetric cipher by key partition and using the Chinese Remainder Theorem (CRT) in the decryption process to produce a lightweight RSA algorithm. …”
    Get full text
    Article