咨询与建议

限定检索结果

文献类型

  • 175 篇 会议
  • 118 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 296 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 249 篇 工学
    • 158 篇 计算机科学与技术...
    • 85 篇 电气工程
    • 56 篇 信息与通信工程
    • 27 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 37 篇 理学
    • 19 篇 物理学
    • 17 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 296 篇 encryption algor...
  • 81 篇 cryptography
  • 27 篇 encryption
  • 24 篇 security
  • 17 篇 images
  • 16 篇 image
  • 15 篇 data security
  • 15 篇 imagery (psychot...
  • 14 篇 blockchain
  • 12 篇 decryption
  • 12 篇 chaos
  • 11 篇 image encryption
  • 10 篇 algorithms
  • 10 篇 security level
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 8 篇 internet of thin...
  • 8 篇 privacy protecti...

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang
  • 2 篇 xiaoqiang zhang

语言

  • 280 篇 英文
  • 13 篇 其他
  • 3 篇 中文
检索条件"主题词=Encryption Algorithm"
296 条 记 录,以下是151-160 订阅
排序:
A new attribute anonymity algorithm in cloud computing environment
收藏 引用
JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING 2019年 第1_suppl期19卷 S259-S267页
作者: Chen, Xi Yuan, Yuan Liu, Yani Cao, Runqiang Panzhihua Univ Panzhihua 617000 Sichuan Peoples R China Sichuan Coll Architectural Technol Deyang 610399 Sichuan Peoples R China
In order to effectively solve the problem of data security in cloud computing, a hierarchical multi-authorization attribute-based encryption (HM-ABE) scheme is proposed. The authorization center of different privilege... 详细信息
来源: 评论
An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map
收藏 引用
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION 2011年 第6期16卷 2383-2389页
作者: Yoon, Eun-Jun Jeon, Il-Soo Kumoh Natl Inst Technol Sch Elect Engn Gumi 730701 Gyeongbuk South Korea Kyungpook Natl Univ Sch Elect Engn & Comp Sci Taegu 702701 South Korea
This paper proposes a new efficient and secure Diffie-Hellman key agreement protocol based on Chebyshey chaotic map. The proposed key agreement protocol uses the semi-group property of Chebyshev polynomials to agree D... 详细信息
来源: 评论
Image compression-encryption scheme using SPIHT and chaotic systems
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2021年 63卷
作者: Laiphrakpam, Dolendro Singh Waikhom, Leepeng Singh Brahma, Digambar Baruah, Pratikshit Biswas, Sarthak Natl Inst Technol Silchar Dept Comp Sci & Engn Silchar India
The world is moving towards digitization for all forms of data. Images are one of the most used data that contains a lot of information. With the increasing network technology, the sharing of data across the internet ... 详细信息
来源: 评论
A human resource management model based on blockchain technology
收藏 引用
INTERNATIONAL JOURNAL OF INNOVATION AND SUSTAINABLE DEVELOPMENT 2024年 第5-6期18卷 705-724页
作者: Yin, Dongmei Zhangjiakou Univ Coll Econ & Business Adm Zhangjiakou 075000 Peoples R China
In order to manage human resource information safely and effectively, this paper studies the human resource management model based on blockchain technology. The client node obtains the human resource information throu... 详细信息
来源: 评论
Research on digital forensics method of 5G communication system in the future based on direct intermediate frequency sampling
收藏 引用
INTERNATIONAL JOURNAL OF AUTONOMOUS AND ADAPTIVE COMMUNICATIONS SYSTEMS 2022年 第1期15卷 46-62页
作者: Luo, Xian Liao, Rongtao Hu, Huanjun Ye, Yuxuan Informat & Commun Branch Hubei EPC Wuhan 430074 Peoples R China
To overcome the problems of low efficiency and poor security in the process of digital forensics, a digital forensics method based on direct if sampling for 5G communication system is proposed. In this method, the mod... 详细信息
来源: 评论
Research on medical data storage and sharing model based on blockchain
收藏 引用
High-Confidence Computing 2023年 第3期3卷 61-67页
作者: Jian Zhao Wenqian Qiang Zisong Zhao Tianbo An Zhejun Kuang Dawei Xu Lijuan Shi College of Network Security Changchun UniversityChangchun 130022China College of Computer Science and Technology Changchun UniversityChangchun 130022China College of Electronic Information Engineering Changchun UniversityChangchun 130022China
With the process of medical informatization,medical diagnosis results are recorded and shared in the form of electronic data in the ***,the security of medical data storage cannot be effectively protected and the unsa... 详细信息
来源: 评论
Study on Strategy of Account Security Based on SQL Server Database
Study on Strategy of Account Security Based on SQL Server Da...
收藏 引用
1st International Conference on E-Business and Information System Security
作者: Zhang, Hong-yan Wang, Wei Henan Inst Engn Dept Comp Zhengzhou Peoples R China
As the aggregation of information, database system is the core part of computer information system. The security of the database system is of great importance, as the important resource of the website, the security of... 详细信息
来源: 评论
Experiences from Using the CORAS Methodology to Analyze a Web Application
收藏 引用
JOURNAL OF CASES ON INFORMATION TECHNOLOGY 2005年 第3期7卷 110-130页
作者: den Braber, Folker Mildal, Arne Bjorn Nes, Jone Stolen, Ketil Vraalsen, Fredrik Leiden Univ Comp Sci Leiden Netherlands NetCom IT & Internet Responsibil IT Dev Activ Oslo Norway NetCom Oslo Norway SINTEF Qual & Secur Technol Grp Dept Cooperat & Trusted Syst Informat & Commun Technol Trondheim Norway SINTEF Informat & Commun Technol Cooperat & Trusted Syst Grp Trondheim Norway
During a field trial performed at the Norwegian telecom company NetCom from May 2003 to July 2003, a methodology for model-based risk analysis was assessed. The chosen methodology was the CORAS methodology (CORAS, 200... 详细信息
来源: 评论
Library data protection and threat detection system based on network security
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY 2024年 第1-2期24卷 137-153页
作者: Xiong, Jianxin Wang, Xianping Hunan Univ Arts & Sci Changde 415000 Hunan Peoples R China Chongqing Univ Arts & Sci Yongchuan 402160 Chongqing Peoples R China
Traditional libraries may have security risks such as data breach, network attack and virus infection, which requires a library data protection and threat detection system based on network security to effectively mana... 详细信息
来源: 评论
Investigation and application of key technologies of aggregated flash payment based on marketing blockchain in the context of massive distributed generation grid connection
收藏 引用
INTERNATIONAL JOURNAL OF EMERGING ELECTRIC POWER SYSTEMS 2023年 第4期24卷 465-474页
作者: Wang, Chao Zhang, Qingfang Yang, Pengfei Si, Xiaofeng Zhou, Li State Grid Gansu Elect Power Co Lanzhou 730000 Gansu Peoples R China State Grid Gansu Elect Power Co Mkt Serv Ctr Lanzhou 730000 Gansu Peoples R China
Optical flash payment technology is a form of optical flash payment application. Its payment scenario is mainly to directly realize "card free payment" in the consumption process through mobile devices, Blue... 详细信息
来源: 评论