咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 106 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 281 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 237 篇 工学
    • 152 篇 计算机科学与技术...
    • 81 篇 电气工程
    • 53 篇 信息与通信工程
    • 25 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 17 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 30 篇 理学
    • 16 篇 数学
    • 13 篇 物理学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
    • 2 篇 工商管理
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 281 篇 encryption algor...
  • 71 篇 cryptography
  • 28 篇 encryption
  • 22 篇 security
  • 15 篇 images
  • 14 篇 data security
  • 14 篇 blockchain
  • 13 篇 imagery (psychot...
  • 12 篇 image
  • 12 篇 chaos
  • 11 篇 image encryption
  • 9 篇 privacy protecti...
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 decryption
  • 8 篇 internet of thin...
  • 8 篇 authentication
  • 8 篇 aes
  • 8 篇 cloud computing
  • 7 篇 chaotic systems

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 bandung inst tec...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...
  • 1 篇 dept. of compute...
  • 1 篇 nmu fac artiller...
  • 1 篇 department of co...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li ju
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang
  • 2 篇 xiaoqiang zhang
  • 2 篇 susilo willy
  • 2 篇 matalgah mustafa...
  • 2 篇 yicong zhou

语言

  • 269 篇 英文
  • 8 篇 其他
  • 3 篇 中文
检索条件"主题词=Encryption Algorithm"
281 条 记 录,以下是91-100 订阅
Optimized Implementations for ZUC-256 on FPGA
收藏 引用
WIRELESS PERSONAL COMMUNICATIONS 2021年 第3期116卷 2615-2632页
作者: Yang, Yatao Zhao, Wenchen Xiong, Liangqing Wang, Ning Ma, Yingjie Beijing Elect Sci & Technol Inst Beijing 100070 Peoples R China Xidian Univ Sch Telecommun Engn Xian 710071 Peoples R China
ZUC-128 algorithm was listed as the core part in the third international encryption and integrity protection algorithms, EEA3 and EIA3 in 4G-LTE mobile communication system by 3rd generation partnership project (3GPP)... 详细信息
来源: 评论
FPGA Implementation of encryption algorithms Based on Residual Polynomials
FPGA Implementation of Encryption Algorithms Based on Residu...
收藏 引用
IEEE International Conference on Electronics and Nanotechnology (ELNANO)
作者: Maksat Kalimoldayev Sakhybay Tynymbayev Miras Magzom Dana Tananova Sergey E. Lyshevski Information Security laboratory Institute of Information and Computational Technologies SC MES RK Almaty Republic of Kazahstan Rochester Institute of Technology Rochester NY USA
This paper describes an encryption algorithm based on a polynomial system of residual classes. We study the FPGA bitstream implementation on the Xilinx and 16-nm UltraScale™ ASIC architecture which enables floating-po... 详细信息
来源: 评论
Blockchain-based dynamic energy management mode for distributed energy system with high penetration of renewable energy
收藏 引用
INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS 2023年 第1期148卷
作者: Wang, Longze Jiang, Siyu Shi, Yuyao Du, Xinxin Xiao, Yuxin Ma, Yiyi Yi, Xinxing Zhang, Yan Li, Meicheng North China Elect Power Univ Sch New Energy State Key Lab Alternate Elect Power Syst Renewable Beijing 102206 Peoples R China North China Elect Power Univ Sch Econ & Management Beijing 102206 Peoples R China Beijing Key Lab New Energy & Low Carbon Dev Beijing 102206 Peoples R China
The emerging blockchain technology is one of the most feasible solutions to decentralized and autonomous energy management in distributed energy systems (DESs). However, with the increase of renewable energy penetrati... 详细信息
来源: 评论
Dynamical Analysis of Novel Memristor Chaotic System and DNA encryption Application
收藏 引用
IRANIAN JOURNAL OF SCIENCE AND TECHNOLOGY-TRANSACTIONS OF ELECTRICAL ENGINEERING 2020年 第1期44卷 449-460页
作者: Sun, Junwei Yang, Qinfei Wang, Yanfeng Zhengzhou Univ Light Ind Coll Elect & Informat Engn Zhengzhou 450002 Peoples R China
In this paper, a new circuit which can include a capacitor, an inductor and a novel nonlinear memristor is designed. Complex dynamics and special characters are investigated by changing three parameters for the design... 详细信息
来源: 评论
Privacy protection against attack scenario of federated learning using internet of things
收藏 引用
ENTERPRISE INFORMATION SYSTEMS 2023年 第9期17卷
作者: Yadav, Kusum Kareri, Elham Alotaibi, Shoayee Dlaim Viriyasitavat, Wattana Dhiman, Gaurav Kaur, Amandeep Univ Hail Coll Comp Sci & Engn Hail Saudi Arabia Prince Sattam Bin Abdulaziz Univ Coll Comp Sci & Engn Alkharj Saudi Arabia Chulalongkorn Business Sch Fac Commerce & Accountancy Dept Stat Bangkok Thailand Chandigarh Univ Univ Ctr Res & Dev Dept Comp Sci & Engn Mohali India Graph Era Deemed Univ Dept Comp Sci & Engn Dehra Dun Uttarakhand India
Laws and regulations for privacy protection have been promulgated one after another, and the phenomenon of data islands has become a significant bottleneck hindering the development of big data and artificial intellig... 详细信息
来源: 评论
Image compression-encryption scheme using SPIHT and chaotic systems
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2021年 63卷
作者: Laiphrakpam, Dolendro Singh Waikhom, Leepeng Singh Brahma, Digambar Baruah, Pratikshit Biswas, Sarthak Natl Inst Technol Silchar Dept Comp Sci & Engn Silchar India
The world is moving towards digitization for all forms of data. Images are one of the most used data that contains a lot of information. With the increasing network technology, the sharing of data across the internet ... 详细信息
来源: 评论
Parameter Dependencies and Optimization of True Random Number Generator (TRNG) using Genetic algorithm (GA)  8
Parameter Dependencies and Optimization of True Random Numbe...
收藏 引用
8th International Conference on Smart Computing and Communications (ICSCC)
作者: Deotare, Vilas Padole, Dinesh Wadhwa, Lalitkumar SPPU Univ NMIET Coll Elect & Technol Pune Maharashtra India GH Raisoni Coll Engn Dept Elect Engn Nagpur Maharashtra India
In the hostile environment, use of pseudo-random numbers in encryption algorithm has become difficult due to increased computing power of attackers. To overcome from the hackers true random number generator solving by... 详细信息
来源: 评论
Securing IoT devices with fast and energy efficient implementation of PRIDE and PRESENT ciphers
Cyber Security and Applications
收藏 引用
Cyber Security and Applications 2025年 3卷
作者: Dahiphale, Vijay Raut, Hrishikesh Bansod, Gaurav Dahiphale, Devendra Binghamton University Binghamton United States North Carolina State University Raleigh United States Pune Institute of Computer Technology Pune India University of Maryland Baltimore County Maryland United States
The rise of low-power, cost-efficient internet-connected devices has led to a need for lightweight cryptography. The lightweight block cipher PRIDE, designed by Martin R. Albrecht, is one of the most efficient ciphers... 详细信息
来源: 评论
Overview of Image encryption Technology based on Chaos and Neural Network
International Core Journal of Engineering
收藏 引用
International Core Journal of Engineering 2021年 第10期7卷 196-201页
作者: Mindan Zhang Ye Tao Wenyu Zhang
Artificial neural network is a very important operation model in the field of artificial intelligence. Ann deals with complex problems by simulating the structure and logic of human brain. Chaotic system is a dynamic ... 详细信息
来源: 评论
Based on SM - 9 Cloud Edge System Information Security Transmission
收藏 引用
电脑学刊 2022年 第1期33卷 189-198页
作者: Cai-Sen Chen Yang-Xia Xiang Jia-Xing Du Song Chen Cong Lin
In the past few years, cloud edge system from conception to gradually improve, develop to today has become a mature side of cloud model. Compared with simple cloud computing, cloud edge system has lower network latenc... 详细信息
来源: 评论