咨询与建议

限定检索结果

文献类型

  • 52 篇 期刊文献
  • 38 篇 会议
  • 2 篇 学位论文

馆藏范围

  • 92 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 82 篇 工学
    • 57 篇 计算机科学与技术...
    • 32 篇 电气工程
    • 25 篇 信息与通信工程
    • 12 篇 电子科学与技术(可...
    • 7 篇 软件工程
    • 7 篇 网络空间安全
    • 5 篇 控制科学与工程
    • 2 篇 仪器科学与技术
    • 2 篇 交通运输工程
    • 2 篇 安全科学与工程
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 生物医学工程(可授...
    • 1 篇 食品科学与工程(可...
  • 18 篇 理学
    • 13 篇 数学
    • 2 篇 化学
    • 1 篇 物理学
    • 1 篇 系统科学
    • 1 篇 科学技术史(分学科...
    • 1 篇 统计学(可授理学、...
  • 9 篇 管理学
    • 6 篇 公共管理
    • 3 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
  • 3 篇 法学
    • 3 篇 法学
  • 3 篇 军事学
    • 3 篇 军队指挥学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 92 篇 data encryption ...
  • 23 篇 cryptography
  • 13 篇 security
  • 12 篇 advanced encrypt...
  • 9 篇 cryptanalysis
  • 9 篇 des
  • 8 篇 encryption
  • 7 篇 data security
  • 6 篇 public key crypt...
  • 5 篇 authentication
  • 5 篇 secure hash algo...
  • 4 篇 dpa
  • 4 篇 rsa
  • 4 篇 encryption algor...
  • 3 篇 internet of thin...
  • 3 篇 triple data encr...
  • 3 篇 des gene
  • 3 篇 data encryption ...
  • 3 篇 diethylstilbestr...
  • 3 篇 aes

机构

  • 2 篇 school of scienc...
  • 2 篇 college of commu...
  • 2 篇 louisiana state ...
  • 1 篇 loughborough col...
  • 1 篇 bits pilani mech...
  • 1 篇 sri krishna inst...
  • 1 篇 sohag univ fac s...
  • 1 篇 katholieke univ ...
  • 1 篇 plymouth polytec...
  • 1 篇 univ of toronto ...
  • 1 篇 chinese acad sci...
  • 1 篇 sathyabama inst ...
  • 1 篇 sohag univ fac c...
  • 1 篇 univ aegean dept...
  • 1 篇 waseda univ dept...
  • 1 篇 nitte meenakshi ...
  • 1 篇 henan polytech u...
  • 1 篇 natl taiwan univ...
  • 1 篇 karpagam coll en...
  • 1 篇 abv indian inst ...

作者

  • 2 篇 knudsen lr
  • 2 篇 kim bg
  • 2 篇 song wj
  • 2 篇 wen wanli
  • 2 篇 xuling jin
  • 2 篇 yang yilin
  • 2 篇 bitat abir
  • 2 篇 kim wh
  • 2 篇 merniz salah
  • 2 篇 you lin
  • 2 篇 jian zhang
  • 1 篇 liu yuling
  • 1 篇 boyd c
  • 1 篇 meletiou g. c.
  • 1 篇 zanaty elnomery ...
  • 1 篇 yanagisawa masao
  • 1 篇 sakurai k
  • 1 篇 mcdonald robert
  • 1 篇 shan xiuming
  • 1 篇 slaman daniel r.

语言

  • 85 篇 英文
  • 7 篇 其他
检索条件"主题词=Data encryption standard"
92 条 记 录,以下是1-10 订阅
排序:
An Efficient and Secure Big data Storage in Cloud Environment by Using Triple data encryption standard
收藏 引用
BIG data AND COGNITIVE COMPUTING 2022年 第4期6卷 101-101页
作者: Ramachandra, Mohan Naik Srinivasa Rao, Madala Lai, Wen Cheng Parameshachari, Bidare Divakarachari Ananda Babu, Jayachandra Hemalatha, Kivudujogappa Lingappa Visvesvaraya Technol Univ Sri Dharmasthala Manjunatheshwara Inst Technol Dept Elect & Commun Engn Ujire 574240 India PACE Inst Technol & Sci Dept Comp Sci & Engn Ongole 523272 India Natl Yunlin Univ Sci & Technol Dept Elect Engn Touliu 640301 Taiwan Natl Yunlin Univ Sci & Technol Bachelor Program Ind Projects Touliu 640301 Taiwan Nitte Meenakshi Inst Technol Dept Elect & Commun Engn Bengaluru 560064 India Malnad Coll Engn Dept Informat Sci & Engn Hassan 573202 India Sri Krishna Inst Technol Dept ISE Bengaluru 560090 India
In recent decades, big data analysis has become the most important research topic. Hence, big data security offers Cloud application security and monitoring to host highly sensitive data to support Cloud platforms. Ho... 详细信息
来源: 评论
New extension of data encryption standard over 128-bit key for digital images
收藏 引用
NEURAL COMPUTING & APPLICATIONS 2021年 第20期33卷 13845-13858页
作者: Arshad, Sadiqa Khan, Majid Inst Space Technol Dept Appl Math & Stat Islamabad Pakistan Inst Space Technol Cyber & Informat Secur Lab Islamabad Pakistan
The strength of any block cipher depends on the key size, total number of rounds and the strength of confusion component against differential cryptanalysis. data encryption standard (DES) as a block cipher has enjoyed... 详细信息
来源: 评论
Key-Based Enhancement of data encryption standard For Text Security  4
Key-Based Enhancement of Data Encryption Standard For Text S...
收藏 引用
IEEE 4th National Computing Colleges Conference (NCCC)
作者: Reyad, Omar Mansour, Hanaa M. Heshmat, Mohamed Zanaty, Elnomery A. Shaqra Univ Coll Comp & IT Shaqra Saudi Arabia Sohag Univ Fac Sci Sohag Egypt Sohag Univ Fac Comp & Informat Sohag Egypt
Securing various data types such as text, image, and video is needed in real-time communications. The transmission of data over an insecure channel is a permanent challenge, especially in mass Internet applications. P... 详细信息
来源: 评论
data encryption standard based protection method of privacy data on Internet of Things
Data encryption standard based protection method of privacy ...
收藏 引用
2016 4th International Conference on Machinery,Materials and Computing Technology(ICMMCT 2016)
作者: Xiaohui CHENG Zhongning LIANG College of Information Science and Engineering Guilin University of Technology
There are a lot of information and network security threats along with the rapid development of Internet of things(Io T). This paper according to the environmental features of the IOT node limited hardware resource an... 详细信息
来源: 评论
Modified data encryption standard encryption algorithm with improved error performance and enhanced security in wireless fading channels
收藏 引用
SECURITY AND COMMUNICATION NETWORKS 2015年 第4期8卷 565-573页
作者: Zibideh, Walid Y. Matalgah, Mustafa M. Univ Mississippi Ctr Wireless Commun Dept Elect Engn University MS 38677 USA
encryption is becoming a vital process to ensure security over the wireless channel. However, using well-known encryption algorithms to encrypt data in wireless communication results in a catastrophic error because of... 详细信息
来源: 评论
Genetic encryption of Safeguarding IoT Image data with DNA-based Security Measures  2
Genetic Encryption of Safeguarding IoT Image Data with DNA-b...
收藏 引用
2nd International Conference on Sustainable Computing and Smart Systems (ICSCSS)
作者: Yuvarani, R. Mahaveerakannan, R. Saveetha Univ Saveetha Inst Med & Tech Sci Saveetha Sch Engn Dept Comp Sci & Engn Chennai 602105 Tamil Nadu India
In order to secure Internet of Things (IoT) devices, this research has developed a revolutionary lightweight encryption method that draws inspiration from the concepts of DNA. Our approach incorporates secret code uti... 详细信息
来源: 评论
Enhancing the security of IOT enabled systems using light weight hybrid cryptography models
收藏 引用
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS 2025年 第3期28卷 1-18页
作者: Bhandiwad, Vinita Ragha, Lakshmappa K. Univ Mumbai Terna Engn Coll Dept Elect & Telecommun Navi Mumbai 400706 Maharashtra India Terna Engn Coll Navi Mumbai 400706 Maharashtra India
Lightweight encryption standards or techniques will be used for encryption and decryption to keep hackers from accessing the data in order to achieve improved security for Internet of Things devices. Due to their limi... 详细信息
来源: 评论
A New Approach of Cryptography for data encryption and Decryption  5
A New Approach of Cryptography for Data Encryption and Decry...
收藏 引用
5th International Conference on Computing and Informatics (IEEE ICCI)
作者: Masud, Khawja Imran Hasan, Md Rakib Hoque, MD. Mozammel Nath, Upel Dev Rahman, Md. Obaidur Dhaka Univ Engn & Technol Dept CSE Gazipur Bangladesh
Nowadays in the modern digital world, everything is rapidly going to be fully dependent on internet communication. Effective use of the internet makes our life easier. The information that we share on the internet has... 详细信息
来源: 评论
Template Attack Assisted Linear Cryptanalysis on Outer Rounds Protected DES Implementations
收藏 引用
COMPUTER JOURNAL 2023年 第6期66卷 1434-1451页
作者: Zhang, Hailong Yang, Wei Chinese Acad Sci Inst Informat Engn State Key Lab Informat Secur Beijing Peoples R China Nanjing Univ Sci & Technol Nanjing Peoples R China
In practice, when the security of a block cipher implementation is considered, the leakages related to the outer rounds encryptions can be used by side channel attacks (SCA) to recover the secret key. Therefore, the o... 详细信息
来源: 评论
data reorganization for image encryption: presentation in the data of hare
收藏 引用
Journal of Cyber Security Technology 2024年
作者: Ali-Pacha, Hana Hadj Brahim, Abderahmane Ali Pacha, Adda Gutub, Adnan Quartz Laboratory ECAM-EPMI Cergy Pontoise Cedex France The University of Science and Technology of Oran - Mohamed Boudiaf Oran Algeria CyberSecurity Department College of Computing Umm Al-Qura University Makkah Saudi Arabia
In track and field, a hare (or pacemaker) is a runner who leads the early part of a race to help other competitors achieve better performance and potentially set records. This practice became common in the early 1980s... 详细信息
来源: 评论