咨询与建议

限定检索结果

文献类型

  • 175 篇 会议
  • 118 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 296 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 249 篇 工学
    • 158 篇 计算机科学与技术...
    • 85 篇 电气工程
    • 56 篇 信息与通信工程
    • 27 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 37 篇 理学
    • 19 篇 物理学
    • 17 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 296 篇 encryption algor...
  • 81 篇 cryptography
  • 27 篇 encryption
  • 24 篇 security
  • 17 篇 images
  • 16 篇 image
  • 15 篇 data security
  • 15 篇 imagery (psychot...
  • 14 篇 blockchain
  • 12 篇 decryption
  • 12 篇 chaos
  • 11 篇 image encryption
  • 10 篇 algorithms
  • 10 篇 security level
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 8 篇 internet of thin...
  • 8 篇 privacy protecti...

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang
  • 2 篇 xiaoqiang zhang

语言

  • 280 篇 英文
  • 13 篇 其他
  • 3 篇 中文
检索条件"主题词=Encryption Algorithm"
296 条 记 录,以下是201-210 订阅
排序:
The Application of Quantum Communication Technology used in Electric Power Information & Communication System Confidential Transmission  19
The Application of Quantum Communication Technology used in ...
收藏 引用
19th International Conference on Advanced Communication Technology (ICACT)
作者: Liu Junwen Zhao Ziyan Hao Jiakai State Grid Informat & Telecommun Branch Beijing 100761 Peoples R China State Grid Beijing Elect Power Co Beijing 100031 Peoples R China
Electric power information system is related with the safe operation of power grid. To ensure the data of electric power information will not be eavesdropped or deciphered, we need a strict way of encryption. With the... 详细信息
来源: 评论
Cyber Maneuvers and Maneuver Keys  33
Cyber Maneuvers and Maneuver Keys
收藏 引用
33rd Annual IEEE Military Communications Conference on Affordable Mission Success - Meeting the Challenge (MILCOM)
作者: Torrieri, Don US Army Res Lab Adelphi MD 20783 USA
This paper presents an overview of cyber maneuvers and their roles in cyber security. As the cyber war escalates, a strategy that preemptively limits and curtails attacks is required. Such a proactive strategy is call... 详细信息
来源: 评论
SLDRM: A Self Local License Digital Rights Management System
SLDRM: A Self Local License Digital Rights Management System
收藏 引用
2nd IEEE International Conference on Digital Ecosystems and Technologies
作者: Sharifi, Mohsen Lajevardi, Behzad Gholami, Omid Iran Univ Sci & Technol Dept Comp Engn Tehran Iran
Digital Rights Management (DRM) systems try to protect copyrights and digital contents by limiting access by users to contents. They provide facilities for electronic publishers to distribute their precious contents t... 详细信息
来源: 评论
Research of Food Safety Supervisory System based on RFID
Research of Food Safety Supervisory System based on RFID
收藏 引用
China Academic Conference on Food Packaging
作者: Li Mengxiao Gu Ping Ge Jinghuan Shanghai Publishing & Printing Coll Shanghai Peoples R China
This paper is aimed at constructing RFID-based food safety supervision system, conducting hardware construction and RFID carrier design, building RFID middleware model, and putting forward RFID information encryption ... 详细信息
来源: 评论
AES crypto chip utilizing high-speed parallel pipelined architecture
AES crypto chip utilizing high-speed parallel pipelined arch...
收藏 引用
IEEE International Symposium on Circuits and Systems (ISCAS)
作者: Kotturi, D Yoo, SM Blizzard, J Cadence Design Syst Plano TX 75093 USA
In November 2001, the National Institute of Standards and Technology (NIST) of the United States chose the Rijndael algorithm as the suitable Advanced encryption Standard (AES) to replace the Data encryption Standard ... 详细信息
来源: 评论
Comparative Study of Lightweight Secure Multiroute Communication System in Low Cost Wireless Sensor Network for CO2 Monitoring
Comparative Study of Lightweight Secure Multiroute Communica...
收藏 引用
International Workshop on Big Data and Information Security (IWBIS)
作者: Habibie, Novian Wiska, Rindra Nugraha, Aditya Murda Wibisono, Ari Mursanto, Petrus Nugroho, Widijanto Satyo Yazid, Setiadi Univ Indonesia Fac Comp Sci Depok Indonesia
Wireless Sensor Network (WSN) is a system used to conduct a remote monitoring in a wide monitoring area. It has a sensor node - a sampling point - which communicate each other to passing their data to central node for... 详细信息
来源: 评论
3D Integration: New Opportunities in Defense Against Cache-timing Side-channel Attacks  33
3D Integration: New Opportunities in Defense Against Cache-t...
收藏 引用
33rd IEEE International Conference on Computer Design (ICCD)
作者: Bao, Chongxi Srivastava, Ankur Univ Maryland ECE Dept College Pk MD 20742 USA
Recently, following the work pioneered by Kocher [1], using cache behavior as a timing side-channel to leak critical system information has received lots of attentions because of its easy-to-implement nature and amazi... 详细信息
来源: 评论
Optimized and Controlled Provisioning of Encrypted Outsourced Data  14
Optimized and Controlled Provisioning of Encrypted Outsource...
收藏 引用
19th ACM Symposium on Access Control Models and Technologies (SACMAT)
作者: Bkakria, Anis Schaad, Andreas Kerschbaum, Florian Cuppens, Frederic Cuppens-Boulahia, Nora Gross-Amblard, David Telecom Bretagne Rennes France SAP AG Karlsruhe Germany Univ Rennes 1 Rennes France
Recent advances in encrypted outsourced databases support the direct processing of queries on encrypted data. Depending on functionality (i.e. operators) required in the queries the database has to use different encry... 详细信息
来源: 评论
The Optimal Key Estimation of Stream Ciphers and Its Approximation algorithm Based on a Probabilistic Inference
The Optimal Key Estimation of Stream Ciphers and Its Approxi...
收藏 引用
International Symposium on Information Theory and its Applications (ISITA)
作者: Iikubo, Yuji Horii, Shunsuke Matsushima, Toshiyasu Waseda Univ Dept Math & Appl Math Shinjuku Ku Tokyo 1698555 Japan
A stream cipher is an important class of encryption algorithms. Its safety depends on the structure of the pseudo-random number generator used. There are various types of pseudo-random number generators in existence, ... 详细信息
来源: 评论
An Improved Fully Homomorphic encryption Scheme under the Cloud Environment  17
An Improved Fully Homomorphic Encryption Scheme under the Cl...
收藏 引用
12th Chinese Conference on Computer Supported Cooperative Work and Social Computing (ChineseCSCW)
作者: Wu, Zuowei Li, Taoshen Guangxi Univ Sch Comp Elect & Informat Nanning Peoples R China
In order to improve the efficiency of the existing homomorphic encryption method, based on the DGHV scheme, an improved fully homomorphic scheme over the integer is proposed. Under the premise of ensuring data owner a... 详细信息
来源: 评论