咨询与建议

限定检索结果

文献类型

  • 50 篇 会议
  • 32 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 84 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 77 篇 工学
    • 57 篇 计算机科学与技术...
    • 33 篇 电气工程
    • 22 篇 信息与通信工程
    • 11 篇 软件工程
    • 8 篇 电子科学与技术(可...
    • 7 篇 控制科学与工程
    • 7 篇 网络空间安全
    • 3 篇 石油与天然气工程
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
  • 7 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 2 篇 公共管理
  • 6 篇 理学
    • 5 篇 数学
    • 2 篇 统计学(可授理学、...
    • 1 篇 系统科学
    • 1 篇 科学技术史(分学科...
  • 3 篇 医学
    • 2 篇 临床医学
    • 1 篇 公共卫生与预防医...
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 84 篇 cryptographic al...
  • 12 篇 cryptography
  • 11 篇 security
  • 7 篇 encryption
  • 5 篇 fpga
  • 4 篇 throughput
  • 4 篇 aes
  • 4 篇 smart grid
  • 3 篇 power grid
  • 3 篇 wide-area monito...
  • 3 篇 block cipher
  • 3 篇 rsa
  • 3 篇 decryption
  • 3 篇 cloud computing
  • 3 篇 scheduling
  • 3 篇 digital signatur...
  • 2 篇 application spec...
  • 2 篇 data security
  • 2 篇 access control
  • 2 篇 cipher

机构

  • 3 篇 univ chinese aca...
  • 2 篇 loyola univ mary...
  • 2 篇 science and tech...
  • 2 篇 kookmin univ dep...
  • 2 篇 brno university ...
  • 2 篇 chinese acad sci...
  • 2 篇 tsinghua univ in...
  • 2 篇 univ chile dept ...
  • 1 篇 univ cooperat co...
  • 1 篇 dept. of compute...
  • 1 篇 elect & telecomm...
  • 1 篇 al maarif univ c...
  • 1 篇 delhi technical ...
  • 1 篇 hiroshima univ r...
  • 1 篇 chinese acad sci...
  • 1 篇 chinese acad sci...
  • 1 篇 sci & technol co...
  • 1 篇 tsinghua univ ts...
  • 1 篇 dept.of computer...
  • 1 篇 electrical engin...

作者

  • 2 篇 li zerun
  • 2 篇 zhang lei
  • 2 篇 baloian nelson
  • 2 篇 chakraborty moum...
  • 2 篇 yun seunghwan
  • 2 篇 budko mikhail
  • 2 篇 wu liji
  • 2 篇 kuhn d. richard
  • 2 篇 yi okyeon
  • 2 篇 saha debasri
  • 2 篇 qiu meikang
  • 2 篇 zhang xiangmin
  • 2 篇 liu rui
  • 2 篇 chakrabarti amla...
  • 2 篇 kacker raghu
  • 2 篇 guirik alexei
  • 2 篇 lijun zhang
  • 2 篇 zhang xiaoyu
  • 2 篇 luther wolfram
  • 2 篇 jia fan

语言

  • 78 篇 英文
  • 4 篇 其他
  • 2 篇 中文
检索条件"主题词=Cryptographic Algorithm"
84 条 记 录,以下是1-10 订阅
排序:
cryptographic algorithm based on pixel shuffling and dynamical chaotic economic map
收藏 引用
IET IMAGE PROCESSING 2018年 第1期12卷 158-167页
作者: Askar, Sameh S. Karawia, Abdelrahman A. Alammar, Fatmah S. King Saud Univ Dept Stat & Operat Researches Coll Sci POB 2455 Riyadh 11451 Saudi Arabia Mansoura Univ Dept Math Fac Sci Mansoura 35516 Egypt Qassim Univ Comp Sci Unit Educ Serv POB 6595 Buraydah 51452 Saudi Arabia
In the literature, different types of algorithms that are organised to encrypt and decrypt images have been introduced. Some of these depend on chaotic systems where bifurcation routes to chaos exist. Those algorithms... 详细信息
来源: 评论
Adaptive Key Management-Based cryptographic algorithm for Privacy Preservation in Wireless Mobile Adhoc Networks for IoT Applications
收藏 引用
WIRELESS PERSONAL COMMUNICATIONS 2022年 第1期124卷 349-376页
作者: Pamarthi, Satyanarayana Narmadha, R. Sathyabama Inst Sci & Technol Dept Elect & Commun Engn Chennai Tamil Nadu India
Mobile ad-hoc networks (MANETs) play an important role in the future of the industrial internet-of-things communication, where smart devices will be connected in a completely distributed manner. In the digital propert... 详细信息
来源: 评论
CLFuzz: Vulnerability Detection of cryptographic algorithm Implementation via Semantic-aware Fuzzing
收藏 引用
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY 2024年 第2期33卷 1-28页
作者: Zhou, Yuanhang Ma, Fuchen Chen, Yuanliang Ren, Meng Jiang, Yu Tsinghua Univ Sch Software 30 Shuangqing Rd Beijing 100084 Peoples R China
Cryptography is a core component of many security applications, and flaws hidden in its implementation will affect the functional integrity or, more severely, pose threats to data security. Hence, guaranteeing the cor... 详细信息
来源: 评论
A VHDL implementation of the Hummingbird cryptographic algorithm  4
A VHDL implementation of the Hummingbird cryptographic algor...
收藏 引用
4th Panhellenic Conference on Electronics and Telecommunications (PACET)
作者: Mammou, Stavroula Balobas, Dimitrios Konofaos, Nikos Aristotle Univ Thessaloniki Dept Informat Thessaloniki 54124 Greece
In this paper a VHDL implementation of the Hummingbird lightweight cryptographic algorithm is presented, with the initialization, encryption and decryption processes analyzed and simulated. All these processes include... 详细信息
来源: 评论
The Design and Implementation of Passwords Management System Based on Blowfish cryptographic algorithm
The Design and Implementation of Passwords Management System...
收藏 引用
International Forum on Computer Science-Technology and Applications
作者: Wang, Mingyan Que, Yanwen Nanchang Univ Dept Comp Sci Nanchang 330031 Peoples R China Nanchang Univ Comp Ctr Nanchang 330031 Peoples R China
In modern society, especially on the Internet, you might have found you are having more and more usernames or IDs and passwords, which contains your private information. There are too many for you to remember and it i... 详细信息
来源: 评论
The Analysis of Database security Requirements for cryptographic algorithm
The Analysis of Database security Requirements for Cryptogra...
收藏 引用
2012 International Conference on Nano Materials and Electric Devices(ICNMED 2012)
作者: Hana Do Hoon Jeong Eui-In Choi Dept.Of Computer Engineering Hannam University
The cloud environment is recently emphasized when we save a large amount of data with a minimum of maintenance. But the cloud is a variable environment that data is likely to be changed when which is transferred, and ... 详细信息
来源: 评论
The Design and Implementation of Passwords Management System Based on Blowfish cryptographic algorithm
The Design and Implementation of Passwords Management System...
收藏 引用
2009 International Forum on Computer Science-Technology and Applications(2009年国际计算机科学技术与应用论坛 IFCSTA 2009)
作者: Mingyan Wang Yanwen Que Dept. of Computer Science of Nanchang University Nanchang 330031 P.R.China Computing Center of Nanchang University Nanchang 330031 P.R.China
In modern society, especially on the Internet, you might have found you are having more and more usernames or IDs and passwords, which contains your private information. There are too many for you to remember and ... 详细信息
来源: 评论
Research of the Kernel Operator Library Based on cryptographic algorithm
收藏 引用
Journal of Donghua University 2001年 第4期000卷
The variety of encryption mechanism and algorithms which were conventionally used have some *** kernel operator library based on cryptographic algorithm is put forward. Owing to the impenetrability of algorithm, the d... 详细信息
来源: 评论
FeCrypto: Instruction Set Architecture for cryptographic algorithms Based on FeFET-Based In-Memory Computing
收藏 引用
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS 2023年 第9期42卷 2889-2902页
作者: Liu, Rui Zhang, Xiaoyu Xie, Zhiwen Wang, Xinyu Li, Zerun Chen, Xiaoming Han, Yinhe Tang, Minghua Xiangtan Univ Sch Mat Sci & Engn Hunan 411105 Peoples R China Chinese Acad Sci Inst Comp Technol Beijing 100190 Peoples R China Univ Chinese Acad Sci Beijing 100190 Peoples R China
Recently, computing-in-memory (CiM) becomes a promising technology for alleviating the memory wall bottleneck. CiM is suitable for data-intensive applications, especially, cryptographic algorithms. Most current crypto... 详细信息
来源: 评论
A Comparative Study of cryptographic algorithms for Cloud Security
A Comparative Study of Cryptographic Algorithms for Cloud Se...
收藏 引用
International Conference on Emerging Trends in Expert Applications and Security (ICETEAS)
作者: Yusufzai, Asifkhan Ranpara, Ripal Vora, Mital Kumbharana, C. K. Shree MN Virani Sci Coll TNRAO Coll Rajkot Gujarat India Saurashtra Univ Dept Comp Sci Rajkot Gujarat India
In the growing technology in the world, there has been a drastic change in the usage, popularity, and requirement of cloud computing. With the popularity of cloud computing, it's required and need arise to secure ... 详细信息
来源: 评论