咨询与建议

限定检索结果

文献类型

  • 24 篇 会议
  • 12 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 37 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 33 篇 工学
    • 20 篇 计算机科学与技术...
    • 11 篇 电气工程
    • 6 篇 信息与通信工程
    • 6 篇 控制科学与工程
    • 5 篇 网络空间安全
    • 4 篇 机械工程
    • 4 篇 软件工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 仪器科学与技术
    • 1 篇 力学(可授工学、理...
    • 1 篇 光学工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 石油与天然气工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 生物医学工程(可授...
    • 1 篇 生物工程
  • 7 篇 管理学
    • 7 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 6 篇 理学
    • 2 篇 数学
    • 2 篇 物理学
    • 1 篇 生物学
    • 1 篇 系统科学
  • 3 篇 军事学
    • 3 篇 军队指挥学
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 37 篇 des algorithm
  • 5 篇 block cipher
  • 4 篇 encryption
  • 4 篇 cryptography
  • 3 篇 rsa algorithm
  • 3 篇 data encryption
  • 3 篇 aes algorithm
  • 3 篇 security
  • 3 篇 decryption
  • 2 篇 des deformation
  • 2 篇 data security
  • 2 篇 image encryption
  • 2 篇 iterations
  • 2 篇 secret key
  • 2 篇 encryption algor...
  • 2 篇 cryptanalysis
  • 2 篇 apriori algorith...
  • 2 篇 md5 algorithm
  • 2 篇 module
  • 1 篇 lsb method

机构

  • 1 篇 penn state univ ...
  • 1 篇 neusoft inst inf...
  • 1 篇 taif univ dept i...
  • 1 篇 georgia inst tec...
  • 1 篇 north china elec...
  • 1 篇 chongqing coll f...
  • 1 篇 shanghai univ pe...
  • 1 篇 rgm coll engn & ...
  • 1 篇 aswan univ fac e...
  • 1 篇 vidya coll engn ...
  • 1 篇 vidya coll engn ...
  • 1 篇 univ babylon iee...
  • 1 篇 ecam epmi quartz...
  • 1 篇 queensland univ ...
  • 1 篇 univ bedfordshir...
  • 1 篇 school of comput...
  • 1 篇 north china elec...
  • 1 篇 lviv polytech na...
  • 1 篇 univ sulaimani d...
  • 1 篇 uthm parit raja ...

作者

  • 2 篇 xu guangming
  • 2 篇 lu chang
  • 1 篇 bilal a.y.
  • 1 篇 zhou jie
  • 1 篇 wang xiaoyuan
  • 1 篇 sant p.
  • 1 篇 bourouis sami
  • 1 篇 qiu shui-sheng
  • 1 篇 fouad m.
  • 1 篇 kumar s. ashok s...
  • 1 篇 maple c.
  • 1 篇 narayanan vijayk...
  • 1 篇 das bhagwan
  • 1 篇 brahim a. hadj
  • 1 篇 lilhore umesh ku...
  • 1 篇 osamor jude
  • 1 篇 zhao hong
  • 1 篇 seniv maxym
  • 1 篇 mclauchlan mr
  • 1 篇 epiphaniou g.

语言

  • 35 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"主题词=DES algorithm"
37 条 记 录,以下是21-30 订阅
排序:
design and Implementation of Encrypted File System Based on FPGA  2
Design and Implementation of Encrypted File System Based on ...
收藏 引用
2nd International Conference on Image and Video Processing, and Artificial Intelligence (IPVAI)
作者: Wang, Xiaoyuan Neusoft Inst Informat Dalian 116023 Peoples R China
Data Encryption Standard (short for des) algorithm is widely used in encryption design. By adopting des algorithm, this paper aims to encrypt and decrypt data files based on FPGA. In this thesis, the author deeply ana... 详细信息
来源: 评论
Generation of Security Key using ECG Signal
Generation of Security Key using ECG Signal
收藏 引用
International Conference on Computing, Communication & Automation (ICCCA)
作者: Khokher, Rohit Singh, Ram Chandra Vidya Coll Engn Dept Comp Sci & Engn Meerut 250002 Uttar Pradesh India Vidya Coll Engn Meerut 250002 Uttar Pradesh India
A system is proposed for generation of security key using R-R interval feature of electrocardiogram (ECG) signals as an input. The system provides a mechanism for verification and identification by generating a securi... 详细信息
来源: 评论
Research on security algorithm for crossing heterogeneous network based on unified communication technology
Research on security algorithm for crossing heterogeneous ne...
收藏 引用
International Conference on Mechatronics and Information Technology (ICMIT 2013)
作者: Chen, Yingying Yang, Delong Zhai, Mingyue North China Elect Power Univ Sch Elect & Elect Engn Beijing Peoples R China
Under the condition of unified communications within heterogeneous network environments, due to the presence of unified security measures such as network protocol, encryption firewalls and so on, communication within ... 详细信息
来源: 评论
Research and Implementation of File Encryption and Decryption
Research and Implementation of File Encryption and Decryptio...
收藏 引用
2nd International Conference on Advances in Computer Science and engineering (CES 2012)
作者: Lu Chang Xu GuangMing ZheJiang Ocean Univ Ctr Comp Republ Expt Ctr Zhou Shan Peoples R China
Analyzed and studied on public key and private key cryptography, studied and compared the RSA and des algorithm, achieved a basic process of file encryption and decryption, provided effectivly protection to document s... 详细信息
来源: 评论
USER HISTORY BASED INSULIN SUGGESTION SYSTEM USING MOBILE APPLICATION  3
USER HISTORY BASED INSULIN SUGGESTION SYSTEM USING MOBILE AP...
收藏 引用
3rd IEEE International Conference on Science Technology Engineering & Management (ICONSTEM)
作者: Kumar, S. Ashok Senthil Jyothi, V. L. Jeppiaar Engn Coll Dept CSE Madras 600119 Tamil Nadu India
Disease diagnosis is one of the diligences where data mining instruments are providing successful outcomes. All the disease (like Heart Disease, Cancer and HIV) is the chairing cause of death all over the world. Some ... 详细信息
来源: 评论
Dec :: Tech Reports :: Src-RR-90
收藏 引用
2016年
[Auto Generated] 1 Introduction 1 2 des algorithm 1 3 GaAs Gate Array 4 4 des Chip Implementation 6 4.1 Organization :: :: ::: :: ::: ::: :: ::: :: ::: :: ::: ::: :: ::: :: : 7 4.2 Implementation Characteristics :: ::... 详细信息
来源: 评论
Power Analysis Attack Resistance Engineering by Dynamic Voltage and Frequency Scaling
收藏 引用
ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS 2012年 第3期11卷 62-62页
作者: Yang, Shengqi Gupta, Pallav Wolf, Marilyn Serpanos, Dimitrios Narayanan, Vijaykrishnan Xie, Yuan Shanghai Univ Shanghai 200041 Peoples R China Villanova Univ Villanova PA 19085 USA Georgia Inst Technol Atlanta GA 30332 USA Univ Patras GR-26110 Patras Greece Penn State Univ University Pk PA 16802 USA
This article proposes a novel approach to cryptosystem design to prevent power analysis attacks. Such attacks infer program behavior by continuously monitoring the power supply current going into the processor core. T... 详细信息
来源: 评论
A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography
收藏 引用
COMPUTERS & ELECTRICAL ENGINEERING 2022年 102卷
作者: Rathore, Manjari Singh Poongodi, M. Saurabh, Praneet Lilhore, Umesh Kumar Bourouis, Sami Alhakami, Wajdi Osamor, Jude Hamdi, Mounir Oriental Inst Technol Bhopal Madhya Pradesh India Hamad Bin Khalifa Univ Coll Sci & Engn Div Informat & Comp Technol Doha Qatar Mody Univ Sci & Technol Lakshmangarh Rajasthan India KIET Grp Inst Ghaziabad Uttar Pradesh India Taif Univ Dept Informat Technol Coll Comp & Informat Technol POB 11099 Taif 21944 Saudi Arabia Glasgow Caledonian Univ Dept Cyber Secur & Networks Cowcaddens Rd Glasgow G4 0BA Lanark Scotland
High-speed wireless network technologies play a vital role in autonomous vehicle communication systems (AVS), i.e., IoV (Internet of Vehicles), and enhance the effectiveness and reliability of the communication networ... 详细信息
来源: 评论
The dynamic and secure storage of enterprise financial data based on cloud platform
收藏 引用
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES 2023年 第5期19卷 449-462页
作者: Zhang, Li Chongqing Coll Finance & Econ Dept Accounting Chongqing 402160 Peoples R China
In order to overcome the problems of poor data security, low integrity and long storage time of traditional methods, this paper proposes a dynamic and secure storage method of enterprise financial data based on cloud ... 详细信息
来源: 评论
Achieving Privacy and Security using QR Code by means of Encryption Technique in ATM  2
Achieving Privacy and Security using QR Code by means of Enc...
收藏 引用
2nd International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM)
作者: Malathi, V. Balamurugan, B. Eshwar, S. RGM Coll Engn & Technol Nandyal India VIT Univ Vellore Tamil Nadu India HTC Global Serv Pvt Ltd Hyderabad Andhra Pradesh India
Smart Card has complications with validation and transmission process. Therefore, by using peeping attack, the secret code was stolen and secret filming while entering Personal Identification Number at the ATM machine... 详细信息
来源: 评论