咨询与建议

限定检索结果

文献类型

  • 24 篇 会议
  • 12 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 37 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 33 篇 工学
    • 20 篇 计算机科学与技术...
    • 11 篇 电气工程
    • 6 篇 信息与通信工程
    • 6 篇 控制科学与工程
    • 5 篇 网络空间安全
    • 4 篇 机械工程
    • 4 篇 软件工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 仪器科学与技术
    • 1 篇 力学(可授工学、理...
    • 1 篇 光学工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 石油与天然气工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 生物医学工程(可授...
    • 1 篇 生物工程
  • 7 篇 管理学
    • 7 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 6 篇 理学
    • 2 篇 数学
    • 2 篇 物理学
    • 1 篇 生物学
    • 1 篇 系统科学
  • 3 篇 军事学
    • 3 篇 军队指挥学
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 37 篇 des algorithm
  • 5 篇 block cipher
  • 4 篇 encryption
  • 4 篇 cryptography
  • 3 篇 rsa algorithm
  • 3 篇 data encryption
  • 3 篇 aes algorithm
  • 3 篇 security
  • 3 篇 decryption
  • 2 篇 des deformation
  • 2 篇 data security
  • 2 篇 image encryption
  • 2 篇 iterations
  • 2 篇 secret key
  • 2 篇 encryption algor...
  • 2 篇 cryptanalysis
  • 2 篇 apriori algorith...
  • 2 篇 md5 algorithm
  • 2 篇 module
  • 1 篇 lsb method

机构

  • 1 篇 penn state univ ...
  • 1 篇 neusoft inst inf...
  • 1 篇 taif univ dept i...
  • 1 篇 georgia inst tec...
  • 1 篇 north china elec...
  • 1 篇 chongqing coll f...
  • 1 篇 shanghai univ pe...
  • 1 篇 rgm coll engn & ...
  • 1 篇 aswan univ fac e...
  • 1 篇 vidya coll engn ...
  • 1 篇 vidya coll engn ...
  • 1 篇 univ babylon iee...
  • 1 篇 ecam epmi quartz...
  • 1 篇 queensland univ ...
  • 1 篇 univ bedfordshir...
  • 1 篇 school of comput...
  • 1 篇 north china elec...
  • 1 篇 lviv polytech na...
  • 1 篇 univ sulaimani d...
  • 1 篇 uthm parit raja ...

作者

  • 2 篇 xu guangming
  • 2 篇 lu chang
  • 1 篇 bilal a.y.
  • 1 篇 zhou jie
  • 1 篇 wang xiaoyuan
  • 1 篇 sant p.
  • 1 篇 bourouis sami
  • 1 篇 qiu shui-sheng
  • 1 篇 fouad m.
  • 1 篇 kumar s. ashok s...
  • 1 篇 maple c.
  • 1 篇 narayanan vijayk...
  • 1 篇 das bhagwan
  • 1 篇 brahim a. hadj
  • 1 篇 lilhore umesh ku...
  • 1 篇 osamor jude
  • 1 篇 zhao hong
  • 1 篇 seniv maxym
  • 1 篇 mclauchlan mr
  • 1 篇 epiphaniou g.

语言

  • 35 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"主题词=DES Algorithm"
37 条 记 录,以下是31-40 订阅
排序:
Securing Cloud Emails Using Two Factor Authentication Based on Password/Apps in Cloud Computing
收藏 引用
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS 2015年 第3期9卷 121-130页
作者: Virgile, Kayigana Yu, Huiqun E China Univ Sci & Technol Dept Comp Sci & Engn Shanghai 200237 Peoples R China Shanghai Key Lab Comp Software Evaluating & Testi Shanghai 201112 Peoples R China
Cloud computing has been extending extensively, involving multiple users on the service it provides. Cloud based email is one of services provided by cloud computing with number of users expanding on yearly basis. Clo... 详细信息
来源: 评论
A design of Privacy Data Encryption and Decryption System for Data Security in Clouds
A Design of Privacy Data Encryption and Decryption System fo...
收藏 引用
2015 4th International Conference on Mechatronics,Materials,Chemistry and Computer Engineering(ICMMCCE 2015)
作者: Cheng Wenjuan Tong Bing Zhou Miaomiao School of Computer and Information Hefei University of Technology
With the rapid development of the IT technology, users increasingly rely on data. While cloud storage and other online service platform make user's privacy data protection become an important issue. In this paper,... 详细信息
来源: 评论
Research on Security Issues of RFID Technology in IOT
Research on Security Issues of RFID Technology in IOT
收藏 引用
2012 National Conference on Information Technology and Computer Science
作者: Jin Hong-ying College of Computer China West Normal University Nanchong,Sichuan,China Tian Min College of Computer China West Normal University Nanchong,Sichuan,China
With the global development of IOT,people are more worried about their personal information security *** the analysis of security problems,this paper introduces symmetric grouping algorithm des to encrypt the data bet... 详细信息
来源: 评论
Implementation Analysis of Encryption and Decryption algorithm Based on python Language  22
Implementation Analysis of Encryption and Decryption Algorit...
收藏 引用
Proceedings of the 2022 7th International Conference on Systems, Control and Communications
作者: Kai Xiao Wuhan Railway Vocational College of Technology China
Facing the Internet information transmission of WAN or LAN, it is difficult to ensure the security and stability of data transmission after key encryption by using traditional one-way password encryption and two-way s... 详细信息
来源: 评论
Research of typical block cipher algorithms
Research of typical block cipher algorithms
收藏 引用
2010 International Conference on Computer,Mechatronics, Control and Electronic Engineering (CMCE 2010)
作者: Tang Songsheng QingDao university of science&technology College of information science&technology QingDao,China Ma Xianzhen QingDao university of science&technology College of information science&technology QingDao,China
Block cipher algorithms are the typical representive of symmetric *** paper especially reserches on the two typicle cipher algorithms (des and AES algorithm) of block cipher *** also analy their weaknesses and improve... 详细信息
来源: 评论
Research and Implementation of File Encryption and Decryption
Research and Implementation of File Encryption and Decryptio...
收藏 引用
2011 2ND International Conference on Innovative Computing and Communication and 2011 Asia-Pacific Conference on Information Technology and Ocean Engineering(CICC-ITOE 2011)
作者: Lu Chang Xu GuangMing Republic Experiment Center Computer Center Zhe Jiang Ocean University
Analyzed and studied on public key and private key cryptography, studied and compared the RSA and des algorithm, achieved a basic process of file encryption and decryption, provided effectivly protection to document s... 详细信息
来源: 评论
Research of typical block cipher algorithms
Research of typical block cipher algorithms
收藏 引用
2010 International Conference on Computer,Mechatronics,Control and Electronic Engineering(2010计算机、机电、控制与电子工程国际会议 CMCE 2010)
作者: Tang Songsheng Ma Xianzhen QingDao university of science&technology College of information science&technology QingDao China
Block cipher algorithms arc the typical representive of symmetric cryptography. This paper especially reserches on the two typicle cipher algorithms ( des and AES algorithm ) of block cipher *** also analy their w... 详细信息
来源: 评论