咨询与建议

限定检索结果

文献类型

  • 9 篇 会议
  • 8 篇 期刊文献

馆藏范围

  • 17 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16 篇 工学
    • 11 篇 计算机科学与技术...
    • 9 篇 电气工程
    • 4 篇 信息与通信工程
    • 2 篇 机械工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 软件工程
    • 1 篇 仪器科学与技术
    • 1 篇 控制科学与工程
    • 1 篇 网络空间安全
  • 1 篇 理学
    • 1 篇 化学
    • 1 篇 生物学

主题

  • 17 篇 cryptography alg...
  • 3 篇 wireless sensor ...
  • 2 篇 aes
  • 2 篇 network security
  • 2 篇 cryptography
  • 1 篇 internet of thin...
  • 1 篇 recurrent neural...
  • 1 篇 performance
  • 1 篇 misuse detection
  • 1 篇 instrumentation
  • 1 篇 closed source so...
  • 1 篇 hill cipher
  • 1 篇 computational ov...
  • 1 篇 elliptic curve c...
  • 1 篇 token
  • 1 篇 fast parallel im...
  • 1 篇 man-in-the-middl...
  • 1 篇 advanced encrypt...
  • 1 篇 simulation resul...
  • 1 篇 digital identity...

机构

  • 1 篇 chinese acad sci...
  • 1 篇 vellore inst tec...
  • 1 篇 tsinghua univers...
  • 1 篇 urmia univ fac a...
  • 1 篇 department of el...
  • 1 篇 univ khartoum sc...
  • 1 篇 islamic azad uni...
  • 1 篇 sudan univ sci &...
  • 1 篇 shanghai jiao to...
  • 1 篇 univ chinese aca...
  • 1 篇 sejong univ dept...
  • 1 篇 technol informat...
  • 1 篇 vellore inst tec...
  • 1 篇 harbin inst tech...
  • 1 篇 iut acecr esfaha...
  • 1 篇 psg inst technol...
  • 1 篇 department of ma...
  • 1 篇 chinese acad sci...
  • 1 篇 sri ramakrishna ...
  • 1 篇 galgotias univ g...

作者

  • 1 篇 rajasekar p.
  • 1 篇 mangalam h.
  • 1 篇 mohammed tarig
  • 1 篇 wang hui
  • 1 篇 rezai abdalhosse...
  • 1 篇 jia shijie
  • 1 篇 guimaraes g
  • 1 篇 kamde pritesh
  • 1 篇 jiang hp
  • 1 篇 jain damnik
  • 1 篇 mushtaque md asi...
  • 1 篇 farshad eshghi
  • 1 篇 kathrotia krupal...
  • 1 篇 attique muhammad
  • 1 篇 kelner j
  • 1 篇 souto e
  • 1 篇 sudhakar k.
  • 1 篇 liu wei luo rong...
  • 1 篇 qiuyang wu
  • 1 篇 he zhenzhong

语言

  • 16 篇 英文
  • 1 篇 其他
检索条件"主题词=Cryptography algorithm"
17 条 记 录,以下是1-10 订阅
Evaluation of cryptography algorithm Based on Digital Identity Authentication
收藏 引用
Procedia Computer Science 2024年 247卷 1012-1019页
作者: Liang Zhang Jianqiao Sheng Yicao Zhang Qiuyang Wu State Grid Anhui Electric Power Co. Ltd. Information and Communication Branch Hefei Anhui China
cryptography algorithm is an important means to achieve identity authentication, and it is also a key technology to achieve identity authentication. In recent years, cryptography algorithms have been widely used in th... 详细信息
来源: 评论
LAA-D: Lightweight Authentication and Access Control Mechanism with Dual-Data Storage in Cloud-Internet of Things System Using Blockchain
收藏 引用
IRANIAN JOURNAL OF SCIENCE AND TECHNOLOGY-TRANSACTIONS OF ELECTRICAL ENGINEERING 2024年 第4期48卷 1483-1499页
作者: Singh, Inderpal Singh, Balraj Lovely Profess Univ Sch Comp Sci & Engn Phagwara Punjab India
Internet of Things (IoT) applications are popularly involved in day-to-day life. The increase in utilization leads to an increase in network traffic. The incoming users have different intentions in the network and hen... 详细信息
来源: 评论
Logic Realization of Galois Field for AES SBOX using Quantum Dot Cellular Automata
收藏 引用
JOURNAL OF SUPERCOMPUTING 2023年 第3期79卷 3024-3054页
作者: Rajasekar, P. Mangalam, H. Kumar, C. S. Subash Narayana Engn Coll ECE Spsr Nellore 524101 Andhra Pradesh India Sri Ramakrishna Engn Coll ECE Coimbatore 641022 Tamil Nadu India PSG Inst Technol & Appl Res EEE Coimbatore 641062 Tamil Nadu India
With the growing technological trends in VLSI domain, quantum dot cellular automata (QCA) technology is slowly replacing CMOS technology due to its smaller feature size, high operating frequency and reduced power cons... 详细信息
来源: 评论
Hydamc: A Hybrid Detection Approach for Misuse of Cryptographic algorithms in Closed-Source Software  22
Hydamc: A Hybrid Detection Approach for Misuse of Cryptograp...
收藏 引用
IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) / BigDataSE Conference / CSE Conference / EUC Conference / ISCI Conference
作者: Fan, Haoling Zheng, Fangyu Lin, Jingqiang Meng, Lingjia Wang, Mingyu Wang, Qiang Jia, Shijie Ma, Yuan Chinese Acad Sci Inst Informat Engn State Key Lab Informat Secur Beijing Peoples R China Chinese Acad Sci Data Assurance & Commun Secur Res Ctr Beijing Peoples R China Univ Chinese Acad Sci Sch Cyber Secur Beijing Peoples R China Univ Chinese Acad Sci Sch Cryptog Beijing Peoples R China Univ Sci & Technol China Sch Cyber Secur Hefei Peoples R China
Cryptographic algorithms are fundamental to secure software development, but security vulnerabilities can arise during implementation, usage, and when calling third-party libraries. As security standards continue to e... 详细信息
来源: 评论
Security of internet of things based on cryptographic algorithms: a survey
收藏 引用
WIRELESS NETWORKS 2021年 第2期27卷 1515-1555页
作者: Mousavi, Seyyed Keyvan Ghaffari, Ali Besharat, Sina Afshari, Hamed Islamic Azad Univ Dept Comp Engn Urmia Branch Orumiyeh Iran Islamic Azad Univ Dept Comp Engn Tabriz Branch Tabriz Iran Urmia Univ Fac Agr Sci Dept Water Engn Orumiyeh Iran Islamic Azad Univ Dept Mech & Bio Mech Engn Urmia Branch Orumiyeh Iran
Internet of Things (IoT) is a new concept in Information and Communications Technology and its structure is based on smart objects communications. It contributes to controlling, managing, and administrating devices th... 详细信息
来源: 评论
A Hybrid Encryption algorithm for Security Enhancement of Wireless Sensor Networks:A Supervisory Approach to Pipelines
收藏 引用
Computer Modeling in Engineering & Sciences 2020年 第1期122卷 323-349页
作者: Omid Mahdi Ebadati E. Farshad Eshghi Amin Zamani Department of Mathematics and Computer Science Kharazmi UniversityTehranIran Department of Electrical and Computer Engineering Kharazmi UniversityTehranIran
Transmission pipelines are vulnerable to various accidents and acts of ***,a reliable monitoring system is needed to secure the transmission pipelines.A wireless sensor network is a wireless network consisting of dist... 详细信息
来源: 评论
Context Intelligent Crypto-Switching algorithm for Document Security in Cloud Environment  5
Context Intelligent Crypto-Switching Algorithm for Document ...
收藏 引用
5th International Conference on Inventive Computation Technologies (ICICT)
作者: Kamde, Pritesh Carvalho, Ross Jain, Damnik Makwana, Mihir Ambawade, Dayanand Sardar Patel Inst Technol Mumbai Maharashtra India
Data privacy and security is a primary concern for any government/non-government organizations. This organizational data primarily exists in the form of textual documents. These documents aids an organization for exec... 详细信息
来源: 评论
Analytical Study of Hybrid Techniques for Image Encryption and Decryption
收藏 引用
SENSORS 2020年 第18期20卷 5162.-5162.页
作者: Chowdhary, Chiranji Lal Patel, Pushpam Virenbhai Kathrotia, Krupal Jaysukhbhai Attique, Muhammad Perumal, Kumaresan Ijaz, Muhammad Fazal Vellore Inst Technol Sch Informat Technol & Engn Vellore 632014 Tamil Nadu India Vellore Inst Technol Sch Comp Sci & Engn Vellore 632014 Tamil Nadu India Sejong Univ Dept Software Seoul 05006 South Korea Sejong Univ Dept Intelligent Mech Engn Seoul 05006 South Korea
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Sta... 详细信息
来源: 评论
Signing and verifying Certificates by NTRU and RSA algorithms  1
Signing and verifying Certificates by NTRU and RSA algorithm...
收藏 引用
International Conference on Cloud Computing (ICCC)
作者: Elbasheer, Majda Omer Mohammed, Tarig Sudan Univ Sci & Technol Coll Comp Sci & Informat Technol Dept Comp Syst & Networks Khartoum Sudan Univ Khartoum Sch Math Dept Comp Sci Khartoum Sudan
Public key infrastructure (PKI) offers essential services for managing digital certificates and encryption keys for people, programs, and systems;moreover, the PKI helps to provide security services such as confidenti... 详细信息
来源: 评论
Secured mutual authentication between two entities  9
Secured mutual authentication between two entities
收藏 引用
IEEE 9th International Conference on Intelligent Systems and Control (ISCO)
作者: Sudhakar, K. Srikanth, S. Sethuraman, M. Anna Univ AU KBC Res Ctr MIT Campus Madras Tamil Nadu India
Phishing is one of the most common attacks on the networks today and a primary enabler for fraud and identity theft, and the increasing sophistication of the phishers makes it very difficult for users to distinguish b... 详细信息
来源: 评论