咨询与建议

限定检索结果

文献类型

  • 51 篇 期刊文献
  • 38 篇 会议
  • 5 篇 学位论文

馆藏范围

  • 94 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 81 篇 工学
    • 56 篇 计算机科学与技术...
    • 32 篇 电气工程
    • 25 篇 信息与通信工程
    • 12 篇 电子科学与技术(可...
    • 7 篇 软件工程
    • 7 篇 网络空间安全
    • 5 篇 控制科学与工程
    • 2 篇 仪器科学与技术
    • 2 篇 交通运输工程
    • 2 篇 安全科学与工程
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 生物医学工程(可授...
    • 1 篇 食品科学与工程(可...
  • 18 篇 理学
    • 13 篇 数学
    • 2 篇 化学
    • 1 篇 物理学
    • 1 篇 系统科学
    • 1 篇 科学技术史(分学科...
    • 1 篇 统计学(可授理学、...
  • 9 篇 管理学
    • 6 篇 公共管理
    • 3 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
  • 3 篇 法学
    • 3 篇 法学
  • 3 篇 军事学
    • 3 篇 军队指挥学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 94 篇 data encryption ...
  • 22 篇 cryptography
  • 13 篇 advanced encrypt...
  • 12 篇 security
  • 10 篇 des
  • 9 篇 cryptanalysis
  • 8 篇 encryption
  • 6 篇 data security
  • 6 篇 public key crypt...
  • 5 篇 dpa
  • 5 篇 authentication
  • 5 篇 secure hash algo...
  • 4 篇 rsa
  • 4 篇 encryption algor...
  • 4 篇 aes
  • 3 篇 internet of thin...
  • 3 篇 triple data encr...
  • 3 篇 des gene
  • 3 篇 data encryption ...
  • 3 篇 diethylstilbestr...

机构

  • 2 篇 school of scienc...
  • 2 篇 college of commu...
  • 2 篇 louisiana state ...
  • 1 篇 loughborough col...
  • 1 篇 bits pilani mech...
  • 1 篇 sri krishna inst...
  • 1 篇 sohag univ fac s...
  • 1 篇 katholieke univ ...
  • 1 篇 plymouth polytec...
  • 1 篇 univ of toronto ...
  • 1 篇 chinese acad sci...
  • 1 篇 sathyabama inst ...
  • 1 篇 sohag univ fac c...
  • 1 篇 univ aegean dept...
  • 1 篇 waseda univ dept...
  • 1 篇 nitte meenakshi ...
  • 1 篇 henan polytech u...
  • 1 篇 natl taiwan univ...
  • 1 篇 karpagam coll en...
  • 1 篇 abv indian inst ...

作者

  • 2 篇 knudsen lr
  • 2 篇 kim bg
  • 2 篇 song wj
  • 2 篇 wen wanli
  • 2 篇 xuling jin
  • 2 篇 yang yilin
  • 2 篇 bitat abir
  • 2 篇 kim wh
  • 2 篇 merniz salah
  • 2 篇 you lin
  • 2 篇 jian zhang
  • 1 篇 liu yuling
  • 1 篇 boyd c
  • 1 篇 meletiou g. c.
  • 1 篇 zanaty elnomery ...
  • 1 篇 yanagisawa masao
  • 1 篇 sakurai k
  • 1 篇 mcdonald robert
  • 1 篇 shan xiuming
  • 1 篇 slaman daniel r.

语言

  • 88 篇 英文
  • 6 篇 其他
检索条件"主题词=Data Encryption Standard"
94 条 记 录,以下是1-10 订阅
排序:
Breaking the data encryption standard using networks of evolutionary processors with parallel string rewriting rules
收藏 引用
INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS 2009年 第4期86卷 567-576页
作者: Choudhary, Ashish Krithivasan, Kamala Indian Inst Technol Dept Comp Sci & Engn Madras 600036 Tamil Nadu India
In this paper we introduce a biologically inspired distributed computing model called networks of evolutionary processors with parallel string rewriting rules (NEPPS), which is a variation of the hybrid networks of ev... 详细信息
来源: 评论
New extension of data encryption standard over 128-bit key for digital images
收藏 引用
NEURAL COMPUTING & APPLICATIONS 2021年 第20期33卷 13845-13858页
作者: Arshad, Sadiqa Khan, Majid Inst Space Technol Dept Appl Math & Stat Islamabad Pakistan Inst Space Technol Cyber & Informat Secur Lab Islamabad Pakistan
The strength of any block cipher depends on the key size, total number of rounds and the strength of confusion component against differential cryptanalysis. data encryption standard (DES) as a block cipher has enjoyed... 详细信息
来源: 评论
Modified data encryption standard encryption algorithm with improved error performance and enhanced security in wireless fading channels
收藏 引用
SECURITY AND COMMUNICATION NETWORKS 2015年 第4期8卷 565-573页
作者: Zibideh, Walid Y. Matalgah, Mustafa M. Univ Mississippi Ctr Wireless Commun Dept Elect Engn University MS 38677 USA
encryption is becoming a vital process to ensure security over the wireless channel. However, using well-known encryption algorithms to encrypt data in wireless communication results in a catastrophic error because of... 详细信息
来源: 评论
Key-Based Enhancement of data encryption standard For Text Security  4
Key-Based Enhancement of Data Encryption Standard For Text S...
收藏 引用
IEEE 4th National Computing Colleges Conference (NCCC)
作者: Reyad, Omar Mansour, Hanaa M. Heshmat, Mohamed Zanaty, Elnomery A. Shaqra Univ Coll Comp & IT Shaqra Saudi Arabia Sohag Univ Fac Sci Sohag Egypt Sohag Univ Fac Comp & Informat Sohag Egypt
Securing various data types such as text, image, and video is needed in real-time communications. The transmission of data over an insecure channel is a permanent challenge, especially in mass Internet applications. P... 详细信息
来源: 评论
Differential power analysis for data encryption standard
Differential power analysis for data encryption standard
收藏 引用
8th International Conference on Electronic Measurement and Instruments
作者: Sun Haitao He Xunlai Zhao Qiang Chu Jie Ordnance Engn Coll Dept Guns Engn Shijiazhuang 050003 Hebei Peoples R China Ordnance Engn Coll Dept Comp Engn Shijiazhuang 050003 Hebei Peoples R China
Along with the society relies on more and more greatly to the computer, people also attach more and more importance to the security problem in the application. The cryptography is continuously safeguarding the safe ef... 详细信息
来源: 评论
Strength of Two data encryption standard Implementations Under Timing Attacks
收藏 引用
ACM Transactions on Information and System Security 1999年 第4期2卷 416-437页
作者: Hevia, Alejandro Kiwi, Marcos Dept. de Cs. de la Computación Fac. de Cs. Físicas y Matemáticas University of Chile Santiago Casilla 2777 Avenida Blanco Encalada 2120 Chile Dept. de Ing. Matemática Fac. de Cs. Físicas y Matemáticas University of Chile Santiago Casilla 170/3 Chile
We study the vulnerability of two implementations of the data encryption standard (DES) cryptosystem under a timing attack. A timing attack is a method, recently proposed by Paul Kocher, that is designed to break cryp... 详细信息
来源: 评论
data encryption standard based protection method of privacy data on Internet of Things
Data encryption standard based protection method of privacy ...
收藏 引用
2016 4th International Conference on Machinery,Materials and Computing Technology(ICMMCT 2016)
作者: Xiaohui CHENG Zhongning LIANG College of Information Science and Engineering Guilin University of Technology
There are a lot of information and network security threats along with the rapid development of Internet of things(Io T). This paper according to the environmental features of the IOT node limited hardware resource an... 详细信息
来源: 评论
An Efficient and Secure Big data Storage in Cloud Environment by Using Triple data encryption standard
收藏 引用
BIG data AND COGNITIVE COMPUTING 2022年 第4期6卷 101-101页
作者: Ramachandra, Mohan Naik Srinivasa Rao, Madala Lai, Wen Cheng Parameshachari, Bidare Divakarachari Ananda Babu, Jayachandra Hemalatha, Kivudujogappa Lingappa Visvesvaraya Technol Univ Sri Dharmasthala Manjunatheshwara Inst Technol Dept Elect & Commun Engn Ujire 574240 India PACE Inst Technol & Sci Dept Comp Sci & Engn Ongole 523272 India Natl Yunlin Univ Sci & Technol Dept Elect Engn Touliu 640301 Taiwan Natl Yunlin Univ Sci & Technol Bachelor Program Ind Projects Touliu 640301 Taiwan Nitte Meenakshi Inst Technol Dept Elect & Commun Engn Bengaluru 560064 India Malnad Coll Engn Dept Informat Sci & Engn Hassan 573202 India Sri Krishna Inst Technol Dept ISE Bengaluru 560090 India
In recent decades, big data analysis has become the most important research topic. Hence, big data security offers Cloud application security and monitoring to host highly sensitive data to support Cloud platforms. Ho... 详细信息
来源: 评论
Differential Power Analysis for data encryption standard
Differential Power Analysis for Data Encryption Standard
收藏 引用
2007 8th International Conference on Electronic Measurement & Instruments(ICEMI’2007)
作者: Sun Haitao~1 He Xunlai~1 Zhao Qiang~2 Chu Jie~2 (1 Dept.of Guns Engineering,Ordnance Engineering College,Hebei,Shijiazhuang 050003 China) (2 Dept.of Computer Engineering,Ordnance Engineering College,Hebei,Shijiazhuang,050003.China)
Along with the society relies on more and more greatly to the computer,people also attach more and more importance to the security problem in the *** cryptography is continuously safeguarding the safe effectively prot... 详细信息
来源: 评论
A simplified data encryption standard algorithm
收藏 引用
Cryptologia 1996年 第1期20卷 77-84页
作者: Schaefer, Edward F. Department of Mathematics Santa Clara University Santa Clara CA 95053 United States
In this paper we describe a method of teaching the data encryption standard algorithm in an undergraduate cryptology course. We present a simplified version of the data encryption standard algorithm with all parameter... 详细信息
来源: 评论