咨询与建议

限定检索结果

文献类型

  • 24 篇 会议
  • 12 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 37 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 33 篇 工学
    • 20 篇 计算机科学与技术...
    • 11 篇 电气工程
    • 6 篇 信息与通信工程
    • 6 篇 控制科学与工程
    • 5 篇 网络空间安全
    • 4 篇 机械工程
    • 4 篇 软件工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 仪器科学与技术
    • 1 篇 力学(可授工学、理...
    • 1 篇 光学工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 石油与天然气工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 生物医学工程(可授...
    • 1 篇 生物工程
  • 7 篇 管理学
    • 7 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 6 篇 理学
    • 2 篇 数学
    • 2 篇 物理学
    • 1 篇 生物学
    • 1 篇 系统科学
  • 3 篇 军事学
    • 3 篇 军队指挥学
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 37 篇 des algorithm
  • 5 篇 block cipher
  • 4 篇 encryption
  • 4 篇 cryptography
  • 3 篇 rsa algorithm
  • 3 篇 data encryption
  • 3 篇 aes algorithm
  • 3 篇 security
  • 3 篇 decryption
  • 2 篇 des deformation
  • 2 篇 data security
  • 2 篇 image encryption
  • 2 篇 iterations
  • 2 篇 secret key
  • 2 篇 encryption algor...
  • 2 篇 cryptanalysis
  • 2 篇 apriori algorith...
  • 2 篇 md5 algorithm
  • 2 篇 module
  • 1 篇 lsb method

机构

  • 1 篇 penn state univ ...
  • 1 篇 neusoft inst inf...
  • 1 篇 taif univ dept i...
  • 1 篇 georgia inst tec...
  • 1 篇 north china elec...
  • 1 篇 chongqing coll f...
  • 1 篇 shanghai univ pe...
  • 1 篇 rgm coll engn & ...
  • 1 篇 aswan univ fac e...
  • 1 篇 vidya coll engn ...
  • 1 篇 vidya coll engn ...
  • 1 篇 univ babylon iee...
  • 1 篇 ecam epmi quartz...
  • 1 篇 queensland univ ...
  • 1 篇 univ bedfordshir...
  • 1 篇 school of comput...
  • 1 篇 north china elec...
  • 1 篇 lviv polytech na...
  • 1 篇 univ sulaimani d...
  • 1 篇 uthm parit raja ...

作者

  • 2 篇 xu guangming
  • 2 篇 lu chang
  • 1 篇 bilal a.y.
  • 1 篇 zhou jie
  • 1 篇 wang xiaoyuan
  • 1 篇 sant p.
  • 1 篇 bourouis sami
  • 1 篇 qiu shui-sheng
  • 1 篇 fouad m.
  • 1 篇 kumar s. ashok s...
  • 1 篇 maple c.
  • 1 篇 narayanan vijayk...
  • 1 篇 das bhagwan
  • 1 篇 brahim a. hadj
  • 1 篇 lilhore umesh ku...
  • 1 篇 osamor jude
  • 1 篇 zhao hong
  • 1 篇 seniv maxym
  • 1 篇 mclauchlan mr
  • 1 篇 epiphaniou g.

语言

  • 35 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"主题词=DES algorithm"
37 条 记 录,以下是1-10 订阅
排序:
A novel pseudo-random number generator: combining hyperchaotic system and des algorithm for secure applications
收藏 引用
JOURNAL OF SUPERCOMPUTING 2025年 第1期81卷 1-37页
作者: Brahim, A. Hadj Pacha, H. Ali Naim, M. Pacha, A. Ali USTO MB Univ LACOSI Lab PoB 1505El MNaouer Bir Djir Oran 31000 Algeria ECAM EPMI Quartz Lab 13 Bd LHautil F-95092 Cergy Pontoise France
Generating random values become increasingly desirable due to its advantages. In this paper, a novel pseudo-random number generator is proposed based on a hyperchaotic system and the des algorithm, with the goal of so... 详细信息
来源: 评论
Exploration on Accounting Data Encryption Processing System Based on des algorithm  1
Exploration on Accounting Data Encryption Processing System ...
收藏 引用
1st IEEE International Conference on Ambient Intelligence, Knowledge Informatics and Industrial Electronics, AIKIIE 2023
作者: Li, Zhi Intelligence Finance and Economics Industry School Shandong Institute of Commerce and Technology Shandong Jinan China
The confidentiality of accounting data is crucial for the security and trade secrets of enterprises. The aim of this study is to explore an accounting data encryption processing system that improves the des algorithm,... 详细信息
来源: 评论
Power system real time data encryption system based on des algorithm  13
Power system real time data encryption system based on DES a...
收藏 引用
13th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)
作者: Cui, Ajun Zhao, Hong Zhang, Xu Zhao, Bo Li, Zhiru State Grid Gansu Elect Power Co Lanzhou 730030 Peoples R China Elect Power Res Inst State Grid Gansu Elect Power Lanzhou 730070 Peoples R China
To ensure the safe operation of power system, this paper studies two technologies of data encryption and digital signature, and designs a real-time data encryption system based on des algorithm, which improves the sec... 详细信息
来源: 评论
Encryption of accounting data using des algorithm in computing environment
收藏 引用
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2020年 第4期39卷 5085-5095页
作者: Wu, Yanhong Dai, Xiuqing Guangdong Ocean Univ Coll Management Cunjin Coll Zhanjiang 524094 Guangdong Peoples R China
The more and more developed network has caused more and more impact on people's life and work, providing convenient channels for people's information exchange, and then improving people's living and workin... 详细信息
来源: 评论
Research on DPA Attack Based on Back and Forth Random Round with des algorithm
收藏 引用
电脑学刊 2017年 第1期28卷 69-71页
作者: Tengrun Li Genying Wang Caisen Chen
For the smart card chip in the power leakage problem in the process of des encryption, we put forward accumulative attack algorithm and segmented attack algorithm on des encryption with back and forth random round whi... 详细信息
来源: 评论
Optimized Approach for Secure Communication Using des algorithm
Optimized Approach for Secure Communication Using DES Algori...
收藏 引用
The 5th International Conference on Innovation in Environment, Civil, Materials and Architecture Engineering (IECMAE-17);the 6th International Conference on Advances in Engineering and Technology (RTET-2017);the 7th International Conference on Chemical, Food, Biological and Health Sciences (CFBHS-2017);the 4th International Conference on Literature, History, Humanities and Social Sciences (LHHSS-2017);the 4th Int’l Conference on Studies in Law, Education, Business & Corporate Social Responsibilities (LEBCSR-17);the 5th International Conference on Advances in Engineering, Science, Technology and Waste Management (AESTWM-17)
作者: Gaurav Bothra Chaitali Pandya Animisha Parmar VIT University
Security remains a major "pain" for both individuals and large organizations in today’s modern *** needs security,whether it is communication through telephonic media,or transfer of data *** security or pri... 详细信息
来源: 评论
des-Co-RSA: A Hybrid Encryption algorithm Based on des and RSA  3
DES-Co-RSA: A Hybrid Encryption Algorithm Based on des and R...
收藏 引用
3rd IEEE International Conference on Power, Electronics and Computer Applications, ICPECA 2023
作者: Zhao, Jingjing North China Electric Power University Department of Computer Science and Engineering Baoding China
The Internet is developing rapidly, which leads to a sharp increase in information transmitted by the network. Moreover, people have a higher demand for encrypting meetings and encrypting information transmission. Cur... 详细信息
来源: 评论
Anti-attacks encryption algorithm based on DNA computing and data encryption standard
收藏 引用
ALEXANDRIA ENGINEERING JOURNAL 2022年 第12期61卷 11651-11662页
作者: Hagras, Tarek Salama, Doaa Youness, Hassan Aswan Univ Fac Energy Engn Aswan Egypt Minia Univ Fac Engn Comp & Syst Engn Dept Al Minya Egypt
Data Encryption Standard (des) is the first 56-bits secret-key standard that is widely used as a symmetric-key 64-bits block encryption/decryption algorithm. Unfortunately, the rapid increase in computing power makes ... 详细信息
来源: 评论
Analysis and improvement of the security of des algorithm
Analysis and improvement of the security of DES algorithm
收藏 引用
2013 International Conference on Sport Science and Computer Science, CCCS 2013
作者: Hu, Meiyan Department of Information Engineering Shandong University of Science and Technology Taian Shandong China
This paper aims to analyze and study the length of the key, the weak key, the design of the S_box, the iterations, and their safety on the basis of the des algorithm. Several transfigurations of des are also put forwa... 详细信息
来源: 评论
The dynamic and secure storage of enterprise financial data based on cloud platform
收藏 引用
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES 2023年 第5期19卷 449-462页
作者: Zhang, Li Chongqing Coll Finance & Econ Dept Accounting Chongqing 402160 Peoples R China
In order to overcome the problems of poor data security, low integrity and long storage time of traditional methods, this paper proposes a dynamic and secure storage method of enterprise financial data based on cloud ... 详细信息
来源: 评论