咨询与建议

限定检索结果

文献类型

  • 21 篇 会议
  • 14 篇 期刊文献

馆藏范围

  • 35 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 30 篇 工学
    • 22 篇 计算机科学与技术...
    • 16 篇 电气工程
    • 6 篇 信息与通信工程
    • 4 篇 电子科学与技术(可...
    • 3 篇 机械工程
    • 2 篇 力学(可授工学、理...
    • 2 篇 控制科学与工程
    • 2 篇 软件工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 环境科学与工程(可...
    • 1 篇 网络空间安全
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 理学
    • 1 篇 数学

主题

  • 35 篇 blowfish algorit...
  • 7 篇 encryption
  • 6 篇 security
  • 6 篇 cloud computing
  • 4 篇 decryption
  • 4 篇 cryptography
  • 3 篇 data security
  • 2 篇 password recover...
  • 2 篇 rsa algorithm
  • 2 篇 trusted authenti...
  • 2 篇 s-box
  • 2 篇 encryption and d...
  • 2 篇 shuffle algorith...
  • 2 篇 cloud security
  • 1 篇 sybil attack
  • 1 篇 saas
  • 1 篇 internet of thin...
  • 1 篇 hybrid technique
  • 1 篇 fuzzy logic
  • 1 篇 hybrid gray wolf...

机构

  • 2 篇 west visayas sta...
  • 2 篇 technol inst phi...
  • 1 篇 deltax co ltd ai...
  • 1 篇 saraswati coll e...
  • 1 篇 deenbandhu chhot...
  • 1 篇 pune inst comp t...
  • 1 篇 pakistan inst en...
  • 1 篇 saraswati colleg...
  • 1 篇 nbn sinhgad sch ...
  • 1 篇 anna univ egs pi...
  • 1 篇 francis xavier e...
  • 1 篇 mundiapolis univ...
  • 1 篇 vardhaman coll e...
  • 1 篇 univ babylon iee...
  • 1 篇 gulf coll fac co...
  • 1 篇 karunya univ dep...
  • 1 篇 cse department g...
  • 1 篇 inst engn & mana...
  • 1 篇 mtech student ad...
  • 1 篇 kalasalingam aca...

作者

  • 3 篇 gerardo bobby d.
  • 3 篇 medina ruji p.
  • 2 篇 corpuz reynaldo ...
  • 1 篇 el yassini khali...
  • 1 篇 akhtar muhammad ...
  • 1 篇 perrone al
  • 1 篇 r. manner
  • 1 篇 asad ali
  • 1 篇 raza ahmad
  • 1 篇 rahimunnisa k.
  • 1 篇 koul suparti
  • 1 篇 vijaya waghmare
  • 1 篇 manju suresh
  • 1 篇 cordova ronald s...
  • 1 篇 bokolo anthony j...
  • 1 篇 arshiya sajid an...
  • 1 篇 dinesh e.
  • 1 篇 hazra tapan kuma...
  • 1 篇 sureshkumar s.
  • 1 篇 gawali dhanashri...

语言

  • 34 篇 英文
  • 1 篇 法文
检索条件"主题词=Blowfish algorithm"
35 条 记 录,以下是1-10 订阅
排序:
blowfish algorithm Implementation on Electronic Data in a Communication Network
Blowfish Algorithm Implementation on Electronic Data in a Co...
收藏 引用
International Conference on Electrical and Computing Technologies and Applications (ICECTA)
作者: Cordova, Ronald S. Maata, Rolou Lyn R. Halibas, Alrence S. Gulf Coll Fac Comp Sci Muscat Oman
Data, information, and knowledge are valuable assets of most business organizations. Protecting and securing these assets is crucial to their success. Computer security systems have increasingly become an integral par... 详细信息
来源: 评论
blowfish algorithm For Patient Health Monitoring
Blowfish Algorithm For Patient Health Monitoring
收藏 引用
IEEE International Conference on Inventive Computation Technologies (ICICT)
作者: Kondawar, Snehal S. Gawali, Dhanashri H. NBN Sinhgad Sch Engn Elect & Telecommun Dept Pune Maharashtra India
Wireless medical devices are very useful for monitoring the health of patients continuously. Wearable medical devices come in contact with the harsh environment many times. Hence, security of these devices while sendi... 详细信息
来源: 评论
Chaotic map-embedded blowfish algorithm for security enhancement of colour image encryption
收藏 引用
NONLINEAR DYNAMICS 2015年 第4期81卷 2079-2093页
作者: Jawad, Lahieb Mohammed Sulong, Ghazali Univ Teknol Malaysia Fac Comp Media & Games Innovat Ctr Excellence MaGIC X Skudai 81310 Kagawa Malaysia
The quest for achieving an accurate and efficient algorithm in enhancing the security of colour image encryption is never-ending. We enhance the security level of conventional blowfish algorithm (BA) for colour image ... 详细信息
来源: 评论
A Modified Approach of blowfish algorithm Based On S-Box Permutation using Shuffle algorithm  2018
A Modified Approach of Blowfish Algorithm Based On S-Box Per...
收藏 引用
7th International Conference on Network, Communication and Computing (ICNCC)
作者: Corpuz, Reynaldo R. Gerardo, Bobby D. Medina, Ruji P. Technol Inst Philippines 938 Aurora Blvd Quezon City 1109 Philippines West Visayas State Univ Iloilo Philippines
blowfish algorithm has been widely analyzed and gradually accepted as a good and powerful cryptographic algorithm offering several advantages among which is suitability and efficiency for implementing hardware and sof... 详细信息
来源: 评论
Using a Modified Approach of blowfish algorithm for Data Security in Cloud Computing  2018
Using a Modified Approach of Blowfish Algorithm for Data Sec...
收藏 引用
6th International Conference on Information Technology - IoT and Smart City (ICIT)
作者: Corpuz, Reynaldo R. Gerardo, Bobby D. Medina, Ruji P. Technol Inst Philippines 938 Aurora Blvd Quezon City 1109 Philippines West Visayas State Univ Iloilo Philippines
Cloud computing brought remarkable potential changes and excellent opportunities to the information technology industry. It is particularly useful in most of the networked transactions. Cloud computing common issue pr... 详细信息
来源: 评论
Security Aware Data Transaction Using Optimized blowfish algorithm in Cloud Environment
收藏 引用
JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS 2021年 第1期30卷
作者: Dinesh, E. Ramesh, S. M. Anna Univ Dept Elect & Commun Engn M Kumarasamy Coll Engn Chennai Tamil Nadu India Anna Univ EGS Pillay Engn Coll Dept Elect & Commun Engn Chennai Tamil Nadu India
Cloud computing has become a growing technique due to its on-demand service and scalable features. Most of the applications of the cloud today are in data storage. Data protection and privacy have thus become a major ... 详细信息
来源: 评论
Hardware Implementation of blowfish algorithm for the Secure Data Transmission in Internet of Things
收藏 引用
Procedia Technology 2016年 25卷 248-255页
作者: Manju Suresh M. Neema MTech student Adi Shankara Institute Of Engineering & Technology Kalady 683574 India Assistant Professor Adi Shankara Institute Of Engineering & Technology Kalady 683574 India
As Internet of Things (IoT) can be broadly used in many fields, the security of IoT is gaining importance. In IoT, all the devices are connected. If a hacker manages to enter the network, he may access confidential da... 详细信息
来源: 评论
Secured Data Transmission Using Pareto Optimization Based Lion Swarm Optimization and Double Encryption based blowfish algorithm in WSN  23
Secured Data Transmission Using Pareto Optimization Based Li...
收藏 引用
Proceedings of the 5th International Conference on Information Management & Machine Intelligence
作者: Viji Gripsy.J Kowsalya R Banupriya C V Sathya R Department of Computer Science PSGR Krishnammal College for Women India Department of Computer Science PSG College of Arts & Science India
The protection of wireless sensor networks is a complex challenge due to the inherent characteristics of the sensors themselves. These sensors are characterized by their low memory capacity, constrained energy resourc... 详细信息
来源: 评论
An Enhanced blowfish (eBf) algorithm for Securing x64FileMessage Content  10
An Enhanced BlowFish (eBf) Algorithm for Securing x64FileMes...
收藏 引用
10th IEEE International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment and Management (HNICEM)
作者: Dulla, Godfrey L. Gerardo, Bobby D. Medina, Ruji P. Technol Inst Philippines Aurora Blvd Quezon City Philippines
Security to information has tremendously changed the way computer and network transactions performed. One of the methods to secure data is through encryption. Encryption transforms information to ciphertext that only ... 详细信息
来源: 评论
Computational Complexity of Modified blowfish Cryptographic algorithm on Video Data
收藏 引用
algorithmS 2022年 第10期15卷 373-373页
作者: Adeniyi, Abidemi Emmanuel Misra, Sanjay Daniel, Eniola Bokolo, Anthony, Jr. Precious Cornerstone Univ Dept Comp Sci Ibadan 200223 Nigeria Ostfold Univ Coll Dept Comp Sci & Commun N-1757 Halden Norway Landmark Univ Dept Comp Sci Omu Aran 251103 Nigeria Inst Energy Technol Dept Appl Data Sci N-1777 Halden Norway
Background: The technological revolution has allowed users to exchange data and information in various fields, and this is one of the most prevalent uses of computer technologies. However, in a world where third parti... 详细信息
来源: 评论