咨询与建议

限定检索结果

文献类型

  • 9 篇 会议
  • 8 篇 期刊文献

馆藏范围

  • 17 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16 篇 工学
    • 11 篇 计算机科学与技术...
    • 9 篇 电气工程
    • 4 篇 信息与通信工程
    • 2 篇 机械工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 软件工程
    • 1 篇 仪器科学与技术
    • 1 篇 控制科学与工程
    • 1 篇 网络空间安全
  • 1 篇 理学
    • 1 篇 化学
    • 1 篇 生物学

主题

  • 17 篇 cryptography alg...
  • 3 篇 wireless sensor ...
  • 2 篇 aes
  • 2 篇 network security
  • 2 篇 cryptography
  • 1 篇 internet of thin...
  • 1 篇 recurrent neural...
  • 1 篇 performance
  • 1 篇 misuse detection
  • 1 篇 instrumentation
  • 1 篇 closed source so...
  • 1 篇 hill cipher
  • 1 篇 computational ov...
  • 1 篇 elliptic curve c...
  • 1 篇 token
  • 1 篇 fast parallel im...
  • 1 篇 man-in-the-middl...
  • 1 篇 advanced encrypt...
  • 1 篇 simulation resul...
  • 1 篇 digital identity...

机构

  • 1 篇 chinese acad sci...
  • 1 篇 vellore inst tec...
  • 1 篇 tsinghua univers...
  • 1 篇 urmia univ fac a...
  • 1 篇 department of el...
  • 1 篇 univ khartoum sc...
  • 1 篇 islamic azad uni...
  • 1 篇 sudan univ sci &...
  • 1 篇 shanghai jiao to...
  • 1 篇 univ chinese aca...
  • 1 篇 sejong univ dept...
  • 1 篇 technol informat...
  • 1 篇 vellore inst tec...
  • 1 篇 harbin inst tech...
  • 1 篇 iut acecr esfaha...
  • 1 篇 psg inst technol...
  • 1 篇 department of ma...
  • 1 篇 chinese acad sci...
  • 1 篇 sri ramakrishna ...
  • 1 篇 galgotias univ g...

作者

  • 1 篇 rajasekar p.
  • 1 篇 mangalam h.
  • 1 篇 mohammed tarig
  • 1 篇 wang hui
  • 1 篇 rezai abdalhosse...
  • 1 篇 jia shijie
  • 1 篇 guimaraes g
  • 1 篇 kamde pritesh
  • 1 篇 jiang hp
  • 1 篇 jain damnik
  • 1 篇 mushtaque md asi...
  • 1 篇 farshad eshghi
  • 1 篇 kathrotia krupal...
  • 1 篇 attique muhammad
  • 1 篇 kelner j
  • 1 篇 souto e
  • 1 篇 sudhakar k.
  • 1 篇 liu wei luo rong...
  • 1 篇 qiuyang wu
  • 1 篇 he zhenzhong

语言

  • 16 篇 英文
  • 1 篇 其他
检索条件"主题词=Cryptography Algorithm"
17 条 记 录,以下是11-20 订阅
排序:
Implementation of New Encryption algorithm with Random Key Selection and Minimum Space Complexity  2
Implementation of New Encryption Algorithm with Random Key S...
收藏 引用
International Conference on Advances in Computer Engineering and Applications (ICACEA)
作者: Mushtaque, Md Asif Dhiman, Harsh Galgotias Univ Gr Noida India
In this paper, we proposed our new symmetric key encryption algorithm with reduced space complexity (AM Encryption algorithm-AMEA). According to disk encryption theory an encryption technique should use less than or e... 详细信息
来源: 评论
A New Left-to-Right Scalar Multiplication algorithm Using a New Recoding Technique
收藏 引用
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS 2014年 第3期8卷 31-38页
作者: Rezai, Abdalhossein Keshavarzi, Parviz IUT ACECR Esfahan Iran Semnan Univ Elect & Comp Engn Fac Semnan Iran
Elliptic Curve Cryptosystem (ECC) is a well-known cryptosystem for securing the communications. The most important operation in ECC is scalar multiplication. The integer representation plays an important role in the p... 详细信息
来源: 评论
Acceleration of AES encryption with OpenCL  9
Acceleration of AES encryption with OpenCL
收藏 引用
Ninth Asia Joint Conference on Information Security AsiaJCIS
作者: Yuan, Yuheng He, Zhenzhong Gong, Zheng Qiu, Weidong South China Normal Univ Sch Comp Sci Guangzhou 510631 Guangdong Peoples R China Technol Informat Secur Shanghai Key Lab Integrate Adm Shanghai 200240 Peoples R China Shanghai Jiao Tong Univ Coll Informat Secur Shanghai 200240 Peoples R China
The occurrence of multi-core processors has made parallel techniques popular. OpenCL, enabling access to the computing power of multi-platforms, taking advantage of the parallel feature of computing devices, gradually... 详细信息
来源: 评论
Accurate Modeling for Predicting cryptography Overheads on Wireless Sensor Nodes
Accurate Modeling for Predicting Cryptography Overheads on W...
收藏 引用
11th International Conference on Advanced Communication Technology
作者: Liu, Wei Ying, Beihua Yang, Huazhong Wang, Hui Tsinghua Univ Dept Elect Engn Beijing 100084 Peoples R China
Resource constraints make it considerably difficult to implement and optimize cryptography algorithms on sensor nodes. In order to provide guidelines for design, it is necessary to predict overheads of these algorithm... 详细信息
来源: 评论
AN ACCURATE PREDICTION MODEL FOR COMPUTATIONAL OVERHEADS OF SECURITY MECHANISMS IN WIRELESS SENSOR NETWORKS
收藏 引用
Journal of Electronics(China) 2009年 第5期26卷 699-705页
作者: Liu Wei Luo Rong Yang Huazhong Department of Electronic Engineering Tsinghua University Beijing 100084 China
In Wireless Sensor Networks (WSNs), it is necessary to predict computational overheads of security mechanisms without final implementations to provide guidelines for system design. This paper presents an accurate and ... 详细信息
来源: 评论
Evaluation of security mechanisms in wireless sensor networks
Evaluation of security mechanisms in wireless sensor network...
收藏 引用
International Conference on Systems Communications
作者: Guimaraes, G Souto, E Sadok, D Kelner, J Univ Fed Pernambuco Informat Ctr Recife PE Brazil
Ad hoc and wireless sensor networks have recently emerged as successful technologies in a number of application domains. The need to build security services into them remains however a considerable challenge as the ha... 详细信息
来源: 评论
Design of an RSA module against power analysis attacks  5
Design of an RSA module against power analysis attacks
收藏 引用
5th International Conference on ASIC
作者: Jiang, HP Mao, ZG Harbin Inst Technol Dept Microelect Sci & Technol Harbin 150001 Peoples R China
Power analysis attacks could be used to analysis the key information according to leakage information depending on the operation of cryptography algorithm and its hardware. And they are high effectiveness with low cos... 详细信息
来源: 评论