咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 106 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 281 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 237 篇 工学
    • 152 篇 计算机科学与技术...
    • 81 篇 电气工程
    • 53 篇 信息与通信工程
    • 25 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 17 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 30 篇 理学
    • 16 篇 数学
    • 13 篇 物理学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
    • 2 篇 工商管理
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 281 篇 encryption algor...
  • 71 篇 cryptography
  • 28 篇 encryption
  • 22 篇 security
  • 15 篇 images
  • 14 篇 data security
  • 14 篇 blockchain
  • 13 篇 imagery (psychot...
  • 12 篇 image
  • 12 篇 chaos
  • 11 篇 image encryption
  • 9 篇 privacy protecti...
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 decryption
  • 8 篇 internet of thin...
  • 8 篇 authentication
  • 8 篇 aes
  • 8 篇 cloud computing
  • 7 篇 chaotic systems

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 bandung inst tec...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...
  • 1 篇 dept. of compute...
  • 1 篇 nmu fac artiller...
  • 1 篇 department of co...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li ju
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang
  • 2 篇 xiaoqiang zhang
  • 2 篇 susilo willy
  • 2 篇 matalgah mustafa...
  • 2 篇 yicong zhou

语言

  • 269 篇 英文
  • 8 篇 其他
  • 3 篇 中文
检索条件"主题词=Encryption Algorithm"
281 条 记 录,以下是221-230 订阅
The security analysis of PhpBB forum
The security analysis of PhpBB forum
收藏 引用
International Conference on Cyberspace Technology (CCT 2014)
作者: Lijun Zhang Jia Fan Science and Technology on Communication Security Laboratory ChengDu China
PhpBB forum is one of the widely applied network forums. In this paper, we investigate the security of this kind of forum. We analyze the whole process of security mechanism related to user's password, including p... 详细信息
来源: 评论
A Smaller and Faster Variant of RSM  14
A Smaller and Faster Variant of RSM
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Noritaka Yamashita Kazuhiko Minematsu Toshihiko Okamura Yukiyasu Tsunoo NEC Corporation Nakahara-Ku Kawasaki Kanagawa Japan
Masking is one of the major countermeasures against side-channel attacks to cryptographic modules. Nassar et al. recently proposed a highly efficient masking method, called Rotating S-boxes Masking (RSM), which can be... 详细信息
来源: 评论
Digital encrypt watermarking based on wavelet transform
Digital encrypt watermarking based on wavelet transform
收藏 引用
ICINS 2014 - 2014 International Conference on Information and Network Security
作者: Shibing Zhang Yanan Wu School of Electrical and Information Nantong University China
Watermarking encryption is an effective technique in the copyright protection of digital media. This paper focuses on the watermarking encryption and proposes a digital watermarking encryption algorithm which is based... 详细信息
来源: 评论
PWLCM Based Image encryption Through Compressive Sensing
PWLCM Based Image Encryption Through Compressive Sensing
收藏 引用
IEEE Recent Advances in Intelligent Computational Systems (RAICS)
作者: Abhishek George, Sudhish N. Deepthi, P. P. Natl Inst Technol Dept Elect & Commun Engn Calicut 673601 Kerala India
In this paper, compressive sensing is combined with a chaotic key based generation of measurement matrix to provide an effective encryption algorithm for multimedia security. Block-based compressive sensing provides a... 详细信息
来源: 评论
A New Compression Scheme for Secure Transmission
收藏 引用
International Journal of Automation and computing 2013年 第6期10卷 578-586页
作者: M.Baritha Begum Y.Venkataramani Saranathan College of Engineering
encryption techniques ensure security of data during transmission. However, in most cases, this increases the length of the data, thus it increases the cost. When it is desired to transmit data over an insecure and ba... 详细信息
来源: 评论
On the Implementation of an Efficient Multiplier Logic for FPGA-based Cryptographic Applications
On the Implementation of an Efficient Multiplier Logic for F...
收藏 引用
18th International Conference on Applied Electronics
作者: Schramm, Martin Grzemba, Andreas Univ Appl Sci Deggendorf Deggendorf Germany
The efficiency of cryptographic algorithms when implemented in reconfigurable hardware is mainly determined by the fact of how the underlying finite field arithmetic operations are realized. Especially the field multi... 详细信息
来源: 评论
Laying a Secure Foundation for Mobile Devices  20
Laying a Secure Foundation for Mobile Devices
收藏 引用
20th Annual Network and Distributed System Security Symposium, NDSS 2013
作者: Smalley, Stephen Trusted Systems Research National Security Agency
Conduct and sponsor research to provide information assurance for national security systems. Enabling safe operation in risky or compromised environments. Research into cryptographic algorithms and protocols, system a... 详细信息
来源: 评论
QUATERNION GYRATOR TRANSFORM AND ITS APPLICATION TO COLOR IMAGE encryption
QUATERNION GYRATOR TRANSFORM AND ITS APPLICATION TO COLOR IM...
收藏 引用
IEEE International Conference on Image Processing
作者: Zhuhong Shao Jiasong Wu Jean Louis Coatrieux Gouenou Coatrieux Huazhong Shu Laboratory of Image Science and Technology School of Computer Science and Engineering Southeast University 210096 Nanjing China INSERM U1099 Rennes F-35000 France Institut Mines-Telecom Telecom Bretagne INSERM U1101 Latim Brest F-29238 France
The gyrator transform has been proposed in optics a few years ago. By using the theory of quaternion numbers, this paper presents the quaternion gyrator transform (QGT). It is shown that the QGT can be computed via th... 详细信息
来源: 评论
Extensive Medical Data Storage With Prominent Symmetric algorithms On Cloud - A Protected Framework
Extensive Medical Data Storage With Prominent Symmetric Algo...
收藏 引用
IEEE International Conference on Smart Structures and Systems
作者: G. Nalinipriya R. Aswiri Kumar Associate Professor Saveetha Engineering College Chennai India. PG Scholar Saveetha Engineering College Chennai India.
The cloud is an emerging field in the IT. It is a way of delivering IT-enabled services in the form of software, platform and infrastructure. Cloud computing in recent times has become a trend among all walks of life ... 详细信息
来源: 评论
Ultra-low Power encryption Engine for Wireless Implantable Medical Devices
Ultra-low Power Encryption Engine for Wireless Implantable M...
收藏 引用
55th IEEE International Midwest Symposium on Circuits and Systems (MWSCAS)
作者: Hosseini-Khayat, Saied Bahmanyar, Parvin Rahiminezhad, Ehsan Sawan, Mohamad Ferdowsi Univ Mashhad Dept Elect Engn Digital Syst Design Lab Mashhad Iran Polytechn Montreal Dept Elect Engn Polystim Neurotechnol Lab Montreal PQ H3C 3A7 Canada
Wireless implantable medical devices are expected to perform cryptographic processing at an absolutely low level of power consumption. This paper presents the design of an ultra-low power ASIC core implementing the PR... 详细信息
来源: 评论