ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Social Sciences
Mathematics
Education
Languages
Literature
Technology
Research
Computing
Economy
Architecture and Urbanism
all records (73)

Languages
English
Portuguese
German
Spanish
French

Countries
Indonesia
USA
Italy
Brazil
Australia
South Africa
Canada
Spain
Denmark
Switzerland
all records (75)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
6.550  Articles
1 of 655 pages  |  10  records  |  more records»
Public key cryptosystems are secure only when the authenticity of the public key is assured. Shao proposeda new scheme to overcome the problems of the existing schemes, which suffers from two major drawbacks. Thefirst drawback is the availability of users... see more

This study basically do image management processes which have no restrictions in about permissions to view the images on the XYZ consultant. This results in image can be easily used by those who do not have the right to open it. Therefore, security resear... see more

This paper introduces a computational scheme for calculating the exponential bw where b and w are positive integers. This two-step method is based on elementary number theory that is used routinely in this and similar contexts, especially the Chinese... see more

In multilevel secret sharing, a secret is shared among a set of hierarchically organized participants in a way that the members of the superior compartments are more powerful and can replace the participants of an inferior one to form an authorized coalit... see more

In this article, the notion of modular multiplicative inverse operator (MMIO)I? : (Z/?Z)* ? Z/?Z, I? (a) = a-1,where ?=b × d >3 with b, d ? N, is introduced and studied. A general method to decompose (MMIO) over group of units of the form (Z/?Z)* is al... see more

Let N = pq be the product of two large primes. Consider Chinese remainder theorem-Rivest, Shamir, Adleman (CRT-RSA) with the public encryption exponent e and private decryption exponents dp, dq. It is well known that given any one of dp or dq (or both) on... see more

One technique to obtain validity in protecting a brand is with a watermark, one of the watermark algorithms to provide the validity of a brand is the Chinese Remainder Theorem (CRT) algorithm. In previous studies using the CRT method with canny edge detec... see more

Three secret sharing schemes that use the Mignotte’ssequence and two secret sharing schemes that use the Asmuth-Bloom sequence are proposed in this paper. All these five secret sharing schemes are based on Chinese Remainder Theorem (CRT) [8]. The first sc... see more

1 of 655 pages  |  10  records  |  more records»