咨询与建议

限定检索结果

文献类型

  • 21 篇 会议
  • 14 篇 期刊文献

馆藏范围

  • 35 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 30 篇 工学
    • 22 篇 计算机科学与技术...
    • 16 篇 电气工程
    • 6 篇 信息与通信工程
    • 4 篇 电子科学与技术(可...
    • 3 篇 机械工程
    • 2 篇 力学(可授工学、理...
    • 2 篇 控制科学与工程
    • 2 篇 软件工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 环境科学与工程(可...
    • 1 篇 网络空间安全
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 理学
    • 1 篇 数学

主题

  • 35 篇 blowfish algorit...
  • 7 篇 encryption
  • 6 篇 security
  • 6 篇 cloud computing
  • 4 篇 decryption
  • 4 篇 cryptography
  • 3 篇 data security
  • 2 篇 password recover...
  • 2 篇 rsa algorithm
  • 2 篇 trusted authenti...
  • 2 篇 s-box
  • 2 篇 encryption and d...
  • 2 篇 shuffle algorith...
  • 2 篇 cloud security
  • 1 篇 sybil attack
  • 1 篇 saas
  • 1 篇 internet of thin...
  • 1 篇 hybrid technique
  • 1 篇 fuzzy logic
  • 1 篇 hybrid gray wolf...

机构

  • 2 篇 west visayas sta...
  • 2 篇 technol inst phi...
  • 1 篇 deltax co ltd ai...
  • 1 篇 saraswati coll e...
  • 1 篇 deenbandhu chhot...
  • 1 篇 pune inst comp t...
  • 1 篇 pakistan inst en...
  • 1 篇 saraswati colleg...
  • 1 篇 nbn sinhgad sch ...
  • 1 篇 anna univ egs pi...
  • 1 篇 francis xavier e...
  • 1 篇 mundiapolis univ...
  • 1 篇 vardhaman coll e...
  • 1 篇 univ babylon iee...
  • 1 篇 gulf coll fac co...
  • 1 篇 karunya univ dep...
  • 1 篇 cse department g...
  • 1 篇 inst engn & mana...
  • 1 篇 mtech student ad...
  • 1 篇 kalasalingam aca...

作者

  • 3 篇 gerardo bobby d.
  • 3 篇 medina ruji p.
  • 2 篇 corpuz reynaldo ...
  • 1 篇 el yassini khali...
  • 1 篇 akhtar muhammad ...
  • 1 篇 perrone al
  • 1 篇 r. manner
  • 1 篇 asad ali
  • 1 篇 raza ahmad
  • 1 篇 rahimunnisa k.
  • 1 篇 koul suparti
  • 1 篇 vijaya waghmare
  • 1 篇 manju suresh
  • 1 篇 cordova ronald s...
  • 1 篇 bokolo anthony j...
  • 1 篇 arshiya sajid an...
  • 1 篇 dinesh e.
  • 1 篇 hazra tapan kuma...
  • 1 篇 sureshkumar s.
  • 1 篇 gawali dhanashri...

语言

  • 34 篇 英文
  • 1 篇 法文
检索条件"主题词=Blowfish algorithm"
35 条 记 录,以下是11-20 订阅
排序:
Ensuring Secure Transmission in VANET: Optimal Clustering and Improved LSTM-Based Intrusion Detection
收藏 引用
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS 2025年 第4期38卷
作者: Dalal, Kusum Deenbandhu Chhotu Ram Univ Sci & Technol Dept Elect & Commun Engn Sonipat Haryana India
VANETs are essential for future intelligent transportation systems, enabling communication among vehicles and infrastructure. However, their decentralized nature presents significant security challenges. This paper pr... 详细信息
来源: 评论
Cloud-based data security transactions employing blowfish and spotted hyena optimisation algorithm
收藏 引用
Journal of Control and Decision 2023年 第4期10卷 494-503页
作者: Ch.Chakradhara Rao Tryambak Hiwarkar B.Santhosh Kumar CSE Department Sri Satya Sai University of Technology and Medical SciencesSehoreIndia CSE Department Guru Nanak Institute of TechnologyTelanganaIndia
Because of its on-demand servicing and scalability features in cloud computing,security and confidentiality have converted to key *** transaction information on thirdparty servers carries significant dangers so that m... 详细信息
来源: 评论
A Robust algorithm for Digital Image Copyright Protection and Tampering Detection: Employing DWT, DCT, and blowfish Techniques
收藏 引用
TRAITEMENT DU SIGNAL 2023年 第5期40卷 2019-2027页
作者: Salama, Ahmed S. Shoitan, Rasha Abdallah, Mohamed S. Cho, Young Im Nagm, Ahmad M. Future Univ Fac Engn & Technol Elect Engn Dept New Cairo 11845 Egypt Cairo Higher Inst Engn Dept Comp Engn & Elect Comp Sci & Management Cairo 11845 Egypt Elect Res Inst Comp & Syst Dept Cairo 11843 Egypt Elect Res Inst Informat Dept Cairo 11843 Egypt DeltaX Co Ltd AI Lab 24 Namdaemun Ro 9 GilJung Gu Seoul 04522 South Korea Gachon Univ Dept Comp Engn Seongnam 13415 South Korea
With the rapid proliferation of digital images on the internet, the task of preserving image ownership and ensuring the detection of unauthorized alterations has become increasingly challenging. This study introduces ... 详细信息
来源: 评论
Deep intelligent blockchain technology for securing IoT-based healthcare multimedia data
收藏 引用
WIRELESS NETWORKS 2023年 第6期29卷 2481-2493页
作者: Karthik, G. M. Kumar, A. S. Kalyana Karri, Aruna Bhaskar Jagini, Naga Padmaja Vellore Inst Technol Sch Comp Sci & Engn SCOPE Vellore CampusTiruvalam Rd Vellore 632014 Tamil Nadu India Inst Publ Enterprise Sch Analyt & IT Hyderabad 500101 Telangana India KL Univ Dept Comp Sci & Engn Vijayawada 522302 Andhra Pradesh India Vardhaman Coll Engn Dept Comp Sci & Engn Hyderabad 501218 Telangana India
Nowadays, Internet of Things (IoT) based applications are widely used in different sectors because of their high mobility, low cost, and efficiency. However, the wide usage of these applications leads to various secur... 详细信息
来源: 评论
Developing an optimized routing protocol with rumor riding technique for detection of Sybil attack in VANET environment
收藏 引用
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS 2024年 第6期37卷 e5715-e5715页
作者: Navinkumar, V. R. Somasundaram, D. Univ Coll Engn Arni Dept Comp Sci & Engn Tiruvannamalai India Sri Shakthi Inst Engn & Technol Dept Elect & Commun Engn Coimbatore India
An attack on VANET known as a Sybil attack involves the attacker claiming or stealing multiple identities with the intent of causing havoc on the network's operation by disseminating false information. To protect ... 详细信息
来源: 评论
A Review of Image Steganography Based on Multiple Hashing algorithm
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 2463-2494页
作者: Abdullah Alenizi Mohammad Sajid Mohammadi Ahmad A.Al-Hajji Arshiya Sajid Ansari Department of Information Technology College of Computer and Information SciencesMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Computer Science College of Engineering and Information TechnologyOnaizah CollegesQassim56312Saudi Arabia
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover *** ancient times to the present,the security of secret or vital information has always been a signifi... 详细信息
来源: 评论
Medical image security and authenticity via dual encryption
收藏 引用
APPLIED INTELLIGENCE 2023年 第17期53卷 20647-20659页
作者: Nampalle, Kishore Babu Manhas, Shriansh Raman, Balasubramanian Indian Inst Technol Roorkee India Natl Inst Technol New Delhi India
Since medical images include sensitive patient information, security is the top priority during transmission. In addition to protecting patient data from potential criminals, security helps to confirm the field staff&... 详细信息
来源: 评论
Dynamic virtual cluster cloud security using hybrid steganographic image authentication algorithm
收藏 引用
AUTOMATIKA 2019年 第3期60卷 314-321页
作者: Venkatraman, K. Geetha, K. Anna Univ Chennai 600025 Tamil Nadu India Anna Univ Excel Engn Coll Dept Comp Sci & Engn Komarapalayam India
Storing data in a third party cloud system causes serious problems on data confidentiality. Generally, encryption techniques provide data confidentiality but with limited functionality, which occurs due to unsupported... 详细信息
来源: 评论
Measuring the Security and reliability of Authentication of Social Networking Sites  7
Measuring the Security and reliability of Authentication of ...
收藏 引用
7th International Conference on Communication, Computing and Virtualization (ICCCV)
作者: Sagar, Kumud Waghmare, Vijaya Saraswati Coll Engn & Technol Kharghar 410210 Navi Mumbai India
Social Networking sites nowadays use passwords to authenticate users. But there are certain problems with this;the user may forget his password or the account may be hacked by the attacker. The web services nowadays p... 详细信息
来源: 评论
Secure non real time image encryption algorithm development using cryptography & Steganography  12
Secure non real time image encryption algorithm development ...
收藏 引用
12 IEEE Int C Elect Energy Env Communications Computer Control
作者: Mukhedkar, Moresh Powar, Prajkta Gaikwad, Peter DY Patil Coll Engn Dept E&TC Pune 410507 Maharashtra India VIIT Coll Engn Dept E&TC Pune 410507 Maharashtra India
In the current technology world, data transmission of various multimedia like sensitive images, video, text is very important and security is major concern in the fields of medical, commercial and military fields. Sec... 详细信息
来源: 评论