咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 120 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 297 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 248 篇 工学
    • 157 篇 计算机科学与技术...
    • 84 篇 电气工程
    • 55 篇 信息与通信工程
    • 27 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 36 篇 理学
    • 19 篇 物理学
    • 16 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 297 篇 encryption algor...
  • 81 篇 cryptography
  • 27 篇 encryption
  • 24 篇 security
  • 17 篇 images
  • 16 篇 image
  • 15 篇 data security
  • 15 篇 imagery (psychot...
  • 14 篇 blockchain
  • 12 篇 decryption
  • 12 篇 chaos
  • 11 篇 image encryption
  • 10 篇 algorithms
  • 10 篇 security level
  • 9 篇 privacy protecti...
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 8 篇 internet of thin...

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang
  • 2 篇 xiaoqiang zhang

语言

  • 282 篇 英文
  • 12 篇 其他
  • 3 篇 中文
检索条件"主题词=Encryption Algorithm"
297 条 记 录,以下是11-20 订阅
Blockchain encryption algorithm Based on Aggregated Signature  3
Blockchain Encryption Algorithm Based on Aggregated Signatur...
收藏 引用
2023 IEEE 3rd International Conference on Data Science and Computer Application, ICDSCA 2023
作者: Li, Guangye Ou, Chuang Xi'an Jiaotong-Liverpool University Suzhou China Central South University Changsha China
As the concept of blockchain continues to the hype, an increasing number of industries join the ranks of using blockchain, which also leads to privacy leaks becoming a potential hidden danger. Therefore, more secure a... 详细信息
来源: 评论
Session key based novel lightweight image encryption algorithm using a hybrid of Chebyshev chaotic map and crossover
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2021年 第25期80卷 33843-33863页
作者: Gupta, Manish Gupta, Kamlesh Kumar Shukla, Piyush Kumar UIT RGPV Dept Comp Sci & Engn Bhopal MP India RJIT Dept Informat Technol Tekanpur MP India
In the current era, the majority of communication in IoT-enabled devices, such as smartphones, is now done through images. To shield the images from invaders, a reliable encryption algorithm is needed. Several encrypt... 详细信息
来源: 评论
A Novel Color Image encryption algorithm Based on Three-Dimensional Chaotic Maps and Reconstruction Techniques
收藏 引用
IEEE ACCESS 2021年 9卷 61334-61345页
作者: Qian, Xiaoliang Yang, Qi Li, Qingbo Liu, Qian Wu, Yuanyuan Wang, Wei Zhengzhou Univ Light Ind Coll Elect & Informat Engn Zhengzhou 450002 Peoples R China Zhengzhou Univ Light Ind Coll Math & Informat Sci Zhengzhou 450002 Peoples R China Hainan Univ Sch Informat & Commun Engn Haikou 570228 Hainan Peoples R China
In the paper, a novel color image encryption scheme is proposed by use of the three-dimensional chaotic maps and some data reconstruction techniques. In the diffusion process of the encryption algorithm, the three-dim... 详细信息
来源: 评论
Cryptanalysis of nonlinear confusion component based encryption algorithm
收藏 引用
INTEGRATION-THE VLSI JOURNAL 2021年 79卷 41-47页
作者: Munir, Noor Khan, Majid Shah, Tariq Alanazi, Ammar S. Hussain, Iqtadar Inst Space Technol Cyber & Informat Secur Lab Islamabad Pakistan Inst Space Technol Dept Appl Math & Stat Islamabad Pakistan Quaid I Azam Univ Dept Math Islamabad Pakistan King Abdul Aziz City Sci & Technol Riyadh Saudi Arabia Qatar Univ Dept Math Stat & Phys Doha 2713 Qatar
Recently many substitution box based encryption algorithms ensuring privacy have been proposed. Many, chaotic map based S-boxes have been generated posing high nonlinearity and strong cryptographic properties. Encrypt... 详细信息
来源: 评论
A novel energy-efficient encryption algorithm for secure data in WSNs
收藏 引用
JOURNAL OF SUPERCOMPUTING 2021年 第5期77卷 4754-4777页
作者: Hayouni, Haythem Hamdi, Mohamed Univ Carthage SupCom Carthage Tunisia
Wireless sensor networks (WSNs) are typically deployed environments, often very hostile and without assistance. A certain level of security must be provided. However, the resource constraint is the most important char... 详细信息
来源: 评论
Session key based fast, secure and lightweight image encryption algorithm
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2021年 第7期80卷 10391-10416页
作者: Gupta, Manish Gupta, Kamlesh Kumar Shukla, Piyush Kumar UIT RGPV Dept Comp Sci & Engn Bhopal India RJIT Dept Informat Technol Tekanpur India
Nowadays, most of the communications in IoT enabled devices are done in the form of images. To protect the images from intruders, there is a need for a secure encryption algorithm. Many encryption algorithms have been... 详细信息
来源: 评论
Image encryption algorithm with matrix semi-tensor product
收藏 引用
NONLINEAR DYNAMICS 2021年 第1期105卷 859-876页
作者: Zou, Chengye Wang, Xingyuan Li, Haifeng Anyang Normal Univ Sch Math & Stat Anyang 455000 Peoples R China Dalian Maritime Univ Sch Informat Sci & Technol Dalian 116026 Peoples R China Dalian Univ Technol Sch Software Dalian 116024 Peoples R China
This article proposed an improved 2D-logistic-adjusted-Sine map, which has better ergodicity, pseudo-randomness, unpredictability and wider chaotic range than many existing 2D-chaotic maps. Utilizing improved 2D-logis... 详细信息
来源: 评论
Secure Transmission Method of Power Quality Data in Power Internet of Things Based on the encryption algorithm
收藏 引用
INTERNATIONAL JOURNAL OF DATA WAREHOUSING AND MINING 2023年 第1期19卷 1页
作者: Liu, Xin Chang, Yingxian Yao, Honglei Su, Bing State Grid Shandong Elect Power Res Inst Jinan Peoples R China State Grid Shandong Elect Power Co Jinan Peoples R China
As a new mobile communication technology in the era of the internet of things, 5G is characterized by high speed, low delay, and large connection. It is a network infrastructure to realize human-computer and internet ... 详细信息
来源: 评论
Connection-oriented computer network secure communication and encryption algorithm
收藏 引用
INTERNATIONAL JOURNAL OF AUTONOMOUS AND ADAPTIVE COMMUNICATIONS SYSTEMS 2021年 第1-2期14卷 98-116页
作者: Wu, Bin Shengli Coll China Univ Petr Eberly Coll Sci Dongying 257061 Shandong Peoples R China
This paper studies the data encryption model and encryption method of the connection-oriented computer network communication system. Firstly, the application and security analysis of digital certificate and big intege... 详细信息
来源: 评论
Image encryption algorithm based on reversible information hiding and physical chaos in images
收藏 引用
RESULTS IN PHYSICS 2023年 54卷
作者: Liu, Pengcheng Shaoxing Univ Yuanpei Coll Shaoxing 312000 Zhejiang Peoples R China
This article proposes a reversible information hiding algorithm based on chaos and histogram translation in ciphertext images to address the shortcomings of traditional algorithms such as separation of encryption and ... 详细信息
来源: 评论