Showing 101 - 105 results of 105 for search '"RSA (algorithm)"', query time: 0.07s Refine Results
  1. 101

    An anti virus scheme using digital signature and anomaly detection techniques by Subramaniam, Suresh Babu

    Published 2003
    “…In the scheme, newly downloaded files that have been digitally signed using SHA-l and RSA algorithms are verified at the first layer. Here the source and integrity of the files are determined and the executables with authentic and genuine signatures are accepted and logged into a watch list. …”
    Get full text
    Thesis
  2. 102

    Ensuring confidentiality and privacy of cloud data using a non-deterministic cryptographic scheme by John Kwao Dawson, Frimpong Twum, James Benjamin Hayfron Acquah, Yaw Marfo Missah

    Published 2023-01-01
    “…A comparative analysis of the NCS was performed against AES, DES, and RSA algorithms based on key sizes of 128kb, 256kb, and 512kb using the dataset from Kaggle. …”
    Get full text
    Article
  3. 103

    Ensuring confidentiality and privacy of cloud data using a non-deterministic cryptographic scheme. by John Kwao Dawson, Frimpong Twum, James Benjamin Hayfron Acquah, Yaw Marfo Missah

    Published 2023-01-01
    “…A comparative analysis of the NCS was performed against AES, DES, and RSA algorithms based on key sizes of 128kb, 256kb, and 512kb using the dataset from Kaggle. …”
    Get full text
    Article
  4. 104

    Hybrid cryptography algorithm to improve security cloud storage by Abd Almohsen, Inam Razzaq

    Published 2017
    “…It is not done only by encrypting it but also providing access to the data only on successful authentication. ECC, AES, and RSA algorithms will be used to encrypt the files to enhance security data on the cloud storage. …”
    Get full text
    Thesis
  5. 105

    A Secure, Reliable and Low-Cost Distributed Storage Scheme Based on Blockchain and IPFS for Firefighting IoT Data by Lina Li, Dezheng Jin, Tingting Zhang, Nianfeng Li

    Published 2023-01-01
    “…In addition, we use the AES and RSA algorithms to ensure the security of firefighting IoT data storage and transmission. …”
    Get full text
    Article