咨询与建议

限定检索结果

文献类型

  • 3 篇 期刊文献
  • 2 篇 会议

馆藏范围

  • 5 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 工学
    • 2 篇 电子科学与技术(可...
    • 2 篇 信息与通信工程
    • 2 篇 计算机科学与技术...
    • 1 篇 电气工程
    • 1 篇 控制科学与工程
    • 1 篇 网络空间安全
  • 2 篇 理学
    • 2 篇 数学
  • 2 篇 管理学
    • 1 篇 公共管理
    • 1 篇 图书情报与档案管...
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...

主题

  • 5 篇 blowfish encrypt...
  • 1 篇 medical image se...
  • 1 篇 self-extracting ...
  • 1 篇 privacy protecti...
  • 1 篇 password-based e...
  • 1 篇 component
  • 1 篇 watermarking tec...
  • 1 篇 temporal social ...
  • 1 篇 modified dragonf...
  • 1 篇 cloud services
  • 1 篇 data compilation
  • 1 篇 mode protection
  • 1 篇 security
  • 1 篇 discrete wavelet...
  • 1 篇 signcryption
  • 1 篇 pristine databas...
  • 1 篇 psnr and opposit...
  • 1 篇 fog computing

机构

  • 1 篇 eee uiet panjab ...
  • 1 篇 srm inst sci & t...
  • 1 篇 department of co...
  • 1 篇 cyber security i...
  • 1 篇 bs abdur rahman ...
  • 1 篇 christ deemed un...
  • 1 篇 centurion univ t...
  • 1 篇 k ramakrishnan c...
  • 1 篇 sun yat sen univ...
  • 1 篇 sun yat sen univ...
  • 1 篇 p a college of e...
  • 1 篇 manonmaniam sund...
  • 1 篇 kalasalingam aca...
  • 1 篇 aditya engn coll...
  • 1 篇 sysu cmu shunde ...
  • 1 篇 centurion univ t...
  • 1 篇 department of me...
  • 1 篇 school of comput...

作者

  • 1 篇 lakshmanaprabu s...
  • 1 篇 avudaiappan t.
  • 1 篇 balasubramanian ...
  • 1 篇 swain sangram ke...
  • 1 篇 suggala ravi kum...
  • 1 篇 krishna nanditha
  • 1 篇 krishna m. vamsi
  • 1 篇 pandiyan s. sund...
  • 1 篇 lin qi-tao
  • 1 篇 kaur puneet
  • 1 篇 shamna n.v.
  • 1 篇 pan jing
  • 1 篇 tianjie cao
  • 1 篇 lai jian-huang
  • 1 篇 saravanan m.
  • 1 篇 wang chang-dong
  • 1 篇 bingjie huang
  • 1 篇 shankar k.
  • 1 篇 ling lu
  • 1 篇 raghavendra pati...

语言

  • 5 篇 英文
检索条件"主题词=Blowfish encryption algorithm"
5 条 记 录,以下是1-10 订阅
排序:
Novel optimal region based robust watermarking using modified dragonfly optimization algorithm
收藏 引用
International Journal of Information Technology (Singapore) 2025年 第2期17卷 851-858页
作者: Shamna, N.V. Kaur, Puneet Raghavendra Patil, G.E. Krishna, Nanditha P A College of Engineering Dept of CSE (IoT & amp Cyber Security including Blockchain Technology) Karnataka India EEE UIET Panjab University Chandigarh India Department of Computer Science and Engineering Faculty of Engineering and Technology Jain Deemed-to be University Karnataka Bengaluru 562112 India Department of Medical Electronics Engineering Dayananda Sagar College of Engineering Bengaluru India
The growing concern about unauthorized access and tampering with digital images requires the development of robust and secure watermarking methods. Traditional approaches frequently struggle with achieving a balance b... 详细信息
来源: 评论
Local Data Security and Privacy Protection in Cloud Service Applications  9
Local Data Security and Privacy Protection in Cloud Service ...
收藏 引用
9th International Conference on Frontier of Computer Science and Technology
作者: Lin, Qi-Tao Wang, Chang-Dong Pan, Jing Ling, Lu Lai, Jian-Huang Sun Yat Sen Univ Sch Mobile Informat Engn Zhuhai 519082 Peoples R China Sun Yat Sen Univ Sch Informat Sci & Technol Guangzhou 510006 Guangdong Peoples R China SYSU CMU Shunde Int Joint Res Inst JRI Shunde 528300 Peoples R China
In the past ten years, the technology researches and applications on Cloud Computing have been booming. Depending on large data centers and distributed cluster servers, different layers of Cloud Services make it possi... 详细信息
来源: 评论
Health monitoring jeopardy prophylaxis model based on machine learning in fog computing
收藏 引用
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES 2022年 第7期33卷
作者: Suggala, Ravi Kumar Krishna, M. Vamsi Swain, Sangram Keshari Centurion Univ Technol & Management Dept Comp Sci & Engn PO R SitapurVia Uppalada Paralakhemundi Gajapati Odisha India Aditya Engn Coll A Dept Comp Sci & Engn Surampalem Andhra Pradesh India Centurion Univ Technol & Management Dept Comp Sci & Engn Bhubaneswar Odisha India
Cloud-based fog computing was developed in recent years to make it easier for patients to monitor distant health and discover mosquito-borne syndromes at an initial period, allowing to track the mosquito-borne illness... 详细信息
来源: 评论
Medical Image Security Using Dual encryption with Oppositional Based Optimization algorithm
收藏 引用
JOURNAL OF MEDICAL SYSTEMS 2018年 第11期42卷 208-208页
作者: Avudaiappan, T. Balasubramanian, R. Pandiyan, S. Sundara Saravanan, M. Lakshmanaprabu, S. K. Shankar, K. K Ramakrishnan Coll Technol Dept Comp Sci & Engn Tiruchirappalli Tamil Nadu India Manonmaniam Sundaranar Univ Dept Comp Sci & Engn Tirunelveli Tamil Nadu India CHRIST Deemed Univ Dept Comp Sci & Engn Bengaluru Karnataka India SRM Inst Sci & Technol Dept Informat Technol Kattankulathur Tamil Nadu India BS Abdur Rahman Crescent Inst Sci & Technol Chenn Dept Elect & Instrumentat Engn Madras Tamil Nadu India Kalasalingam Acad Res & Educ Sch Comp Krishnankoil Tamil Nadu India
Security is the most critical issue amid transmission of medical images because it contains sensitive information of patients. Medical image security is an essential method for secure the sensitive data when computeri... 详细信息
来源: 评论
A Password-based encryption Scheme with Symmetric Key Cryptography
A Password-based Encryption Scheme with Symmetric Key Crypto...
收藏 引用
2010 3rd International Conference on Computer and Electrical Engineering(ICCEE 2010)
作者: Bingjie Huang Tianjie Cao School of Computer China University of Mining and Technology
This paper proposes a scheme to encrypt the key by using password-based encryption technology in order to ensure the safety of the files, which ensuring the confidentiality of documents while also ensuring the securit... 详细信息
来源: 评论