咨询与建议

限定检索结果

文献类型

  • 175 篇 会议
  • 118 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 296 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 249 篇 工学
    • 158 篇 计算机科学与技术...
    • 85 篇 电气工程
    • 56 篇 信息与通信工程
    • 27 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 37 篇 理学
    • 19 篇 物理学
    • 17 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 296 篇 encryption algor...
  • 81 篇 cryptography
  • 27 篇 encryption
  • 24 篇 security
  • 17 篇 images
  • 16 篇 image
  • 15 篇 data security
  • 15 篇 imagery (psychot...
  • 14 篇 blockchain
  • 12 篇 decryption
  • 12 篇 chaos
  • 11 篇 image encryption
  • 10 篇 algorithms
  • 10 篇 security level
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 8 篇 internet of thin...
  • 8 篇 privacy protecti...

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang
  • 2 篇 xiaoqiang zhang

语言

  • 280 篇 英文
  • 13 篇 其他
  • 3 篇 中文
检索条件"主题词=Encryption Algorithm"
296 条 记 录,以下是231-240 订阅
排序:
A Two layer secure image encryption technique
A Two layer secure image encryption technique
收藏 引用
International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)
作者: Indrani Das Sanjoy Das Subrata Sahana Ashwini Kumar Department of Computer Sc. Assam University India Department of Computer Sc. Indira Gandhi National Tribal University-RCM India Dept. of Computer Sc. And Engg. Sharda Univesity Uttarpradesh Dept. of Computer Sc and Engg. Graphic Era University Dehradun India
The growing use of networking in almost every possible field, data transferring or data sharing has become an essential need. All kinds of users directly or indirectly involved in data transfer. But data transferring ... 详细信息
来源: 评论
encryption Techniques for Cloud Data Confidentiality
收藏 引用
INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING 2014年 第4期7卷 11-20页
作者: Soofi, Aized Amin Khan, M. Irfan Fazal-e-Amin Govt Coll Univ Coll Comp Sci & Informat Studies Faisalabad Pakistan King Saud Univ Coll Comp & Informat Sci Riyadh Saudi Arabia
Cloud computing is one of the fastest growing internet based technology that facilitates users to utilize services by making use of large poll of resources without installation of any software. Adoption of this techno... 详细信息
来源: 评论
Double image encryption based on the random fractional transform
Double image encryption based on the random fractional trans...
收藏 引用
IET International Radar Conference 2015
作者: X. J. Kang F. Zhang L. Y. Xu Y. S. Zhang Y. B. Li School of Information and Electronics Beijing Institute of Technology Beijing 100081 China School of Mathematics and Statistics Beijing Institute of Technology Beijing 100081 China
This paper proposes a method for double image encryption based on a proposed random fractional transform. Firstly, we produce a pseudorandom sequence to randomize the eigenvalue of the discrete fractional Fourier tran... 详细信息
来源: 评论
Image encryption using a Modified Pseudo-Random Generator
Image Encryption using a Modified Pseudo-Random Generator
收藏 引用
Emerging Trends in Information Technology and Engineering (ic-ETITE), Conference on
作者: Brijgopal Bharadwaj J Sairabanu School of Computer Science Engineering Vellore Institute of Technology Vellore India
This paper presents a new image encryption algorithm, that accepts an initial secret key and an initialization vector, to produce the encryption/decryption keys using a modified pseudo-random generator. This key is us... 详细信息
来源: 评论
Reliability of Information Conversion When Encrypting Graphic Images  1
收藏 引用
International Workshop on Advanced in Information Security Management and Applications, AISMA 2023
作者: Ishchukova, Evgeniya Borlakov, Radmir Southern Federal University Rostov-on-Don Russia
The article examines the influence of the initial image parameters on the result of its encryption for different encryption algorithms and modes of their use. Graphic files of the *.ppm format is used as research obje... 详细信息
来源: 评论
Performance Evaluation and Analysis of encryption Schemes for Wireless Sensor Networks
Performance Evaluation and Analysis of Encryption Schemes fo...
收藏 引用
Digitization (ICD), 2019 International Conference on
作者: Amar Abdelmalek Ghehioueche Noureddine Chikouche Fares Mezrag Computer Science Department University of M 'sila Algeria
Wireless sensor networks (WSNs) technology is one of the most important technologies of the Internet of things. It is effectively applied within several applications in the actual world, including health care, environ... 详细信息
来源: 评论
QUATERNION GYRATOR TRANSFORM AND ITS APPLICATION TO COLOR IMAGE encryption
QUATERNION GYRATOR TRANSFORM AND ITS APPLICATION TO COLOR IM...
收藏 引用
IEEE International Conference on Image Processing
作者: Zhuhong Shao Jiasong Wu Jean Louis Coatrieux Gouenou Coatrieux Huazhong Shu Laboratory of Image Science and Technology School of Computer Science and Engineering Southeast University 210096 Nanjing China INSERM U1099 Rennes F-35000 France Institut Mines-Telecom Telecom Bretagne INSERM U1101 Latim Brest F-29238 France
The gyrator transform has been proposed in optics a few years ago. By using the theory of quaternion numbers, this paper presents the quaternion gyrator transform (QGT). It is shown that the QGT can be computed via th... 详细信息
来源: 评论
Data Security algorithm for Public Decision Support System Based on Blockchain Technology  5
Data Security Algorithm for Public Decision Support System B...
收藏 引用
5th International Conference on Industrial IoT, Big Data and Supply Chain, IIoTBDSC 2024
作者: Yang, Tao Luo, Xiaoli College of Educational Science of Quanzhou Normal University China Zhujiang College Of South China Agricultural University China
It explores data security algorithms pertinent to public decision-making support systems using blockchain technology in solving core issues of the public decision-making process, such data security, openness, and effi... 详细信息
来源: 评论
Image encryption Research based on chaotic sequences and wavelet transform
Image Encryption Research based on chaotic sequences and wav...
收藏 引用
2010 International Conference on Audio,Language and Image Processing(2010年音频、语言与图像处理国际会议 ICALIP 2010)
作者: Runhe Qiu Yuzhe Fu Yun Cao Institute of Information Science and Technology Donghua University Shanghai China
Using the characteristics of the chaotic system, such as ergodicity, sensitivity to initial condition, system parameters and random like behavior, this paper proposes a new image encryption algorithm based on chaotic ... 详细信息
来源: 评论
Accelerating Leveled Fully Homomorphic encryption Using GPU
Accelerating Leveled Fully Homomorphic Encryption Using GPU
收藏 引用
IEEE International Symposium on Circuits and Systems
作者: Wei Wang Zhilu Chen Xinming Huang Department of Electrial and Computer Engineering Worcester Polytechnic Institute MA 01609USA
Gentry introduced the first plausible fully homomorphic encryption (FHE) scheme, which was considered a major breakthrough in cryptography. Several FHE schemes have been proposed to make FHE more efficient for practic... 详细信息
来源: 评论