咨询与建议

限定检索结果

文献类型

  • 24 篇 会议
  • 12 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 37 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 33 篇 工学
    • 20 篇 计算机科学与技术...
    • 11 篇 电气工程
    • 6 篇 信息与通信工程
    • 6 篇 控制科学与工程
    • 5 篇 网络空间安全
    • 4 篇 机械工程
    • 4 篇 软件工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 仪器科学与技术
    • 1 篇 力学(可授工学、理...
    • 1 篇 光学工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 石油与天然气工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 生物医学工程(可授...
    • 1 篇 生物工程
  • 7 篇 管理学
    • 7 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 6 篇 理学
    • 2 篇 数学
    • 2 篇 物理学
    • 1 篇 生物学
    • 1 篇 系统科学
  • 3 篇 军事学
    • 3 篇 军队指挥学
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 37 篇 des algorithm
  • 5 篇 block cipher
  • 4 篇 encryption
  • 4 篇 cryptography
  • 3 篇 rsa algorithm
  • 3 篇 data encryption
  • 3 篇 aes algorithm
  • 3 篇 security
  • 3 篇 decryption
  • 2 篇 des deformation
  • 2 篇 data security
  • 2 篇 image encryption
  • 2 篇 iterations
  • 2 篇 secret key
  • 2 篇 encryption algor...
  • 2 篇 cryptanalysis
  • 2 篇 apriori algorith...
  • 2 篇 md5 algorithm
  • 2 篇 module
  • 1 篇 lsb method

机构

  • 1 篇 penn state univ ...
  • 1 篇 neusoft inst inf...
  • 1 篇 taif univ dept i...
  • 1 篇 georgia inst tec...
  • 1 篇 north china elec...
  • 1 篇 chongqing coll f...
  • 1 篇 shanghai univ pe...
  • 1 篇 rgm coll engn & ...
  • 1 篇 aswan univ fac e...
  • 1 篇 vidya coll engn ...
  • 1 篇 vidya coll engn ...
  • 1 篇 univ babylon iee...
  • 1 篇 ecam epmi quartz...
  • 1 篇 queensland univ ...
  • 1 篇 univ bedfordshir...
  • 1 篇 school of comput...
  • 1 篇 north china elec...
  • 1 篇 lviv polytech na...
  • 1 篇 univ sulaimani d...
  • 1 篇 uthm parit raja ...

作者

  • 2 篇 xu guangming
  • 2 篇 lu chang
  • 1 篇 bilal a.y.
  • 1 篇 zhou jie
  • 1 篇 wang xiaoyuan
  • 1 篇 sant p.
  • 1 篇 bourouis sami
  • 1 篇 qiu shui-sheng
  • 1 篇 fouad m.
  • 1 篇 kumar s. ashok s...
  • 1 篇 maple c.
  • 1 篇 narayanan vijayk...
  • 1 篇 das bhagwan
  • 1 篇 brahim a. hadj
  • 1 篇 lilhore umesh ku...
  • 1 篇 osamor jude
  • 1 篇 zhao hong
  • 1 篇 seniv maxym
  • 1 篇 mclauchlan mr
  • 1 篇 epiphaniou g.

语言

  • 35 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"主题词=DES algorithm"
37 条 记 录,以下是11-20 订阅
排序:
des-Co-RSA: A Hybrid Encryption algorithm Based on des and RSA  3
DES-Co-RSA: A Hybrid Encryption Algorithm Based on des and R...
收藏 引用
3rd IEEE International Conference on Power, Electronics and Computer Applications, ICPECA 2023
作者: Zhao, Jingjing North China Electric Power University Department of Computer Science and Engineering Baoding China
The Internet is developing rapidly, which leads to a sharp increase in information transmitted by the network. Moreover, people have a higher demand for encrypting meetings and encrypting information transmission. Cur... 详细信息
来源: 评论
Research on MOMPdes algorithm of block cipher in compressed sensing  6
Research on MOMPDES algorithm of block cipher in compressed ...
收藏 引用
6th International Conference on Electronics and Information Engineering (ICEIE)
作者: Deng Hubin Zhou Jie Chen Rong Hu Ruifeng E China Jiaotong Univ Dept Coll Informat Engn Nanchang 330013 Peoples R China Dept TELLHOW SCI TECH CO Nanchang 330029 Peoples R China
According to the design of block cipher algorithm thought the current mainstream, des block cipher algorithm based on compressed sensing, combined with the design idea of OMP algorithm, proposed a design of the block ... 详细信息
来源: 评论
Timing Constraints-Based High-Performance des design and Implementation on 28-nm FPGA  1
收藏 引用
50th Annual Convention on Digital Life
作者: Thind, Vandana Pandey, Sujeet Hussain, D. M. Akbar Das, Bhagwan Abdullah, M. F. L. Pandey, Bishwajeet Chitkara Univ Sch Elect & Elect Chandigarh Punjab India Gyanc Res Lab Jammu India Aalborg Univ Esbjerg Denmark UTHM Parit Raja Malaysia
In this work, we are going to implement des algorithm on 28-nm Artix-7 FPGA. To achieve high-performance design goal, we are using minimum period, maximum frequency, minimum low pulse, minimum high pulse for different... 详细信息
来源: 评论
Effects of iterative block ciphers on quality of experience for Internet Protocol Security enabled voice over IP calls
收藏 引用
IET INFORMATION SECURITY 2012年 第3期6卷 141-148页
作者: Epiphaniou, G. Maple, C. Sant, P. Safdar, G. A. Univ Bedfordshire Inst Res Applicable Comp Dept Comp Sci Luton Beds England Univ Bedfordshire Dept Comp Sci & Technol Luton Beds England
Voice over IP (VoIP) is the technology used to transport real-time voice over a packet-switched network. This study analyses the effects of encrypted VoIP streams on perceived Quality of Experience (QoE) from a user&#... 详细信息
来源: 评论
A COMPUTER PACKAGE FOR MEASURING THE STRENGTH OF ENCRYPTION algorithmS
收藏 引用
COMPUTERS & SECURITY 1994年 第8期13卷 687-697页
作者: GUSTAFSON, H DAWSON, E NIELSEN, L CAELLI, W QUEENSLAND UNIV TECHNOL FAC INFORMAT TECHNOLINFORMAT SEC RES CTRBRISBANEQLD 4001AUSTRALIA
designers and users of encryption algorithms used in cipher systems need a systematic approach in examining their ciphers prior to use, to ensure that they are safe from crypt-analytic attack. This paper describes a c... 详细信息
来源: 评论
ADVANCED VLSI VALIDATED INPUT SECURITY DEVICE EMPLOYING DATA AND HARDWARE VALIDATION FEATURES
收藏 引用
IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES 1989年 第6期136卷 471-477页
作者: LLIEV, V DLAY, SS MCLAUCHLAN, MR KOELMANS, AM KINNIMENT, DJ UNIV NEWCASTLE UPON TYNE COMP LABNEWCASTLE TYNE NE1 7RUTYNE & WEARENGLAND
A fast CMOS VLSI device is described to execute the Data Encryption Standard (des) algorithm. The device is known as the validated input security device (VISD) since it enables transmitted and received data to be vali... 详细信息
来源: 评论
Anti-attacks encryption algorithm based on DNA computing and data encryption standard
收藏 引用
ALEXANDRIA ENGINEERING JOURNAL 2022年 第12期61卷 11651-11662页
作者: Hagras, Tarek Salama, Doaa Youness, Hassan Aswan Univ Fac Energy Engn Aswan Egypt Minia Univ Fac Engn Comp & Syst Engn Dept Al Minya Egypt
Data Encryption Standard (des) is the first 56-bits secret-key standard that is widely used as a symmetric-key 64-bits block encryption/decryption algorithm. Unfortunately, the rapid increase in computing power makes ... 详细信息
来源: 评论
Comparison between the application of des on bitmap and JPEG images
收藏 引用
AEJ - Alexandria Engineering Journal 2001年 第4期40卷 485-488页
作者: Salem, D.H. Bilal, A.Y. Fouad, M.
The need for the encryption of the image data is becoming increasingly important as the Internet and Multimedia systems grow in size and popularity. This paper presents a comparison between the application of data enc... 详细信息
来源: 评论
Block Cipher Security Evaluation Based on Fuzzy Logic  1
Block Cipher Security Evaluation Based on Fuzzy Logic
收藏 引用
1st International Scientific Conference on Electrical, Communication, Computer, Power, and Control Engineering (ICECCPCE)
作者: Mohammed, Sirwan A. Sadkhan, Sattar B. Univ Sulaimani Dept Elect Engn Sulaymaniyah Iraq Univ Babylon IEEE IRAQ Sect Hillah Iraq
The main goal of this paper is to present of security evaluation of block cipher use in wireless network. Information security contributes directly to increase level of trust between users by providing an assurance of... 详细信息
来源: 评论
A Decentralized Interactive Architecture for Aerial and Ground Mobile Robots Cooperation
A Decentralized Interactive Architecture for Aerial and Grou...
收藏 引用
International Conference on Control, Automation and Robotics ICCAR
作者: Harik, El Houssein Chouaib Guinand, Frederic Pelvillain, Herve Guerin, Francois Brethe, Jean-Francois Univ Havre LITIS Le Havre France Univ Havre IUT Le Havre France Univ Havre GREAH Le Havre France
This paper presents a novel decentralized interactive architecture for aerial and ground mobile robots cooperation. The aerial mobile robot is used to provide a global coverage during an area inspection, while the gro... 详细信息
来源: 评论