咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 120 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 297 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 248 篇 工学
    • 157 篇 计算机科学与技术...
    • 84 篇 电气工程
    • 55 篇 信息与通信工程
    • 27 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 36 篇 理学
    • 19 篇 物理学
    • 16 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 297 篇 encryption algor...
  • 81 篇 cryptography
  • 27 篇 encryption
  • 24 篇 security
  • 17 篇 images
  • 16 篇 image
  • 15 篇 data security
  • 15 篇 imagery (psychot...
  • 14 篇 blockchain
  • 12 篇 decryption
  • 12 篇 chaos
  • 11 篇 image encryption
  • 10 篇 algorithms
  • 10 篇 security level
  • 9 篇 privacy protecti...
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 8 篇 internet of thin...

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang
  • 2 篇 xiaoqiang zhang

语言

  • 282 篇 英文
  • 12 篇 其他
  • 3 篇 中文
检索条件"主题词=Encryption Algorithm"
297 条 记 录,以下是21-30 订阅
A novel image encryption algorithm based on DNA strand exchange and diffusion
收藏 引用
APPLIED MATHEMATICS AND COMPUTATION 2022年 430卷
作者: Zou, Chengye Wang, Xingyuan Zhou, Changjun Xu, Shujuan Huang, Chun Anyang Normal Univ Sch Math & Stat Anyang 455000 Peoples R China Dalian Maritime Univ Sch Informat Sci & Technol Dalian 116026 Peoples R China Zhejiang Normal Univ Coll Math & Comp Sci Jinhua 321000 Zhejiang Peoples R China Dalian Minzu Univ Inst Machine Intelligence & Biol Comp Dalian 116600 Liaoning Peoples R China Zhengzhou Univ Light Ind Coll Elect & Elect Engn Zhengzhou 450002 Peoples R China
This article proposes an improved tent-dynamic cross coupled map lattice, which has superior ergodicity, broader chaotic range and higher information entropies than cross coupled map lattice and tent-dynamic cross cou... 详细信息
来源: 评论
A new discrete chaotic map application in image encryption algorithm
收藏 引用
PHYSICA SCRIPTA 2022年 第3期97卷 035202-035202页
作者: Yang, Feifei An, Xinlei Xiong, Li Lanzhou Univ Technol Coll Elect & Informat Engn Lanzhou 730050 Peoples R China Lanzhou Jiaotong Univ Sch Math & Phys Lanzhou 730070 Peoples R China Hexi Univ Sch Phys & Electromech Engn Zhangye 734000 Peoples R China
In this work, a new discrete chaotic map is developed from the 1D ICMIC (Iterative Map with Infinite Collapses) to control the 2D Henon map. The performances of the proposed discrete map are evaluated by using the pha... 详细信息
来源: 评论
Enhancing Security of ADS-B Systems with encryption algorithm in the Smart Ocean
收藏 引用
JOURNAL OF COASTAL RESEARCH 2020年 第Spe105期000卷 181-184页
作者: Liu, Zixin Ling, Mingxing Zhu, Ting Xu, Deru He, Yueshun Liu, Zhifeng East China Univ Technol State Key Lab Nucl Resources & Environm Nanchang 330013 Jiangxi Peoples R China East China Univ Technol Nanchang 330000 Jiangxi Peoples R China East China Univ Technol Sch Earth Sci Nanchang 330000 Jiangxi Peoples R China East China Univ Technol Software Coll Nanchang 330000 Jiangxi Peoples R China
The smart ocean is an influencer concept incorporating digitalized associated ocean and seaboard cities. The construction of an omni-bearing smart ocean requires urban resilience, and the application of smart means ca... 详细信息
来源: 评论
An encryption algorithm to Prevent Domain Name System Cache Poisoning Attacks  29
An Encryption Algorithm to Prevent Domain Name System Cache ...
收藏 引用
29th International Telecommunication Networks and Applications Conference (ITNAC)
作者: Li, Xue Jun Ma, Maode Arjun, Narayanan Auckland Univ Technol Dept EEE Auckland New Zealand Nanyang Technol Univ Sch EEE Singapore Singapore
One of the major security threats in domain name system (DNS) is Cache Poisoning (CP) attack, where an attacker can change the IP address in the response packet or the database in DNS. To address CP attacks, many secu... 详细信息
来源: 评论
A Novel encryption algorithm Usted for Power Emergency Communication System  4
A Novel Encryption Algorithm Usted for Power Emergency Commu...
收藏 引用
4th IEEE International Conference on Cloud Computing and Big Data Analysis (ICCCBDA)
作者: Cheng, Xiaowei Liu, Chao Qu, Qian Xiao, Bo Li, Wenhui Yuan, Bingyu Qiu, Yinghui China Gansu Elect Power Co Informat & Telecommun State Grid Corp Lanzhou Gansu Peoples R China North China Elect Power Univ Sch Elect & Elect Engn Beijing Peoples R China
With the increasing complexity of access and network structure of smart devices, there are many security threats in smart distribution networks. How to ensure the security of smart distribution network communication h... 详细信息
来源: 评论
A New Symmetric Key encryption algorithm With Higher Performance  2
A New Symmetric Key Encryption Algorithm With Higher Perform...
收藏 引用
2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)
作者: Murtaza, Abid Pirzada, Syed Jahanzeb Hussain Liu Jianwei Beihang Univ BUAA Sch Elect & Informat Engn Beijing Peoples R China
In this era of information technology, information security is a major concern. To address the challenges of data security, cryptography is used for storage as well as for the communication of data. A cryptographic al... 详细信息
来源: 评论
A block encryption algorithm based on exponentiation transform
收藏 引用
COGENT ENGINEERING 2020年 第1期7卷 Article: 1788292页
作者: Kapalova, Nursulu Khompysh, Ardabek Arici, Muslum Algazy, Kunbolat Inst Informat & Computat Technol RK MES CS Alma Ata Kazakhstan Al Farabi Kazakh Natl Univ Alma Ata Kazakhstan Kocaeli Univ Mech Engn Dept Izmit Turkey
This paper proposes a new block encryption algorithm for cryptographic information protection. It describes a new transformation method EM (Exponentiation Module), which is part of the algorithm, and a method of S-box... 详细信息
来源: 评论
An efficient pixel-level chaotic image encryption algorithm (vol 94, pg 745, 2018)
收藏 引用
NONLINEAR DYNAMICS 2018年 第4期94卷 3155-3155页
作者: Ye, Guodong Pan, Chen Huang, Xiaoling Mei, Qixiang Guangdong Ocean Univ Fac Math & Comp Sci Zhanjiang 524088 Peoples R China Zhejiang Univ Coll Informat Sci & Elect Engn Hangzhou 310027 Zhejiang Peoples R China
In this paper, a new and efficient pixel-level image encryption algorithm is presented. In contrast to the traditional permutation-diffusion architecture, the proposed method enhances the connection between position s... 详细信息
来源: 评论
Analysis of the Effect of a Color Image encryption algorithm  3rd
Analysis of the Effect of a Color Image Encryption Algorithm
收藏 引用
3rd International Conference on Electrical Engineering and Information Technologies for Rail Transportation (EITRT)
作者: Guo, Yukun Hexi Univ Coll Informat Technol & Commun 846 Beihuan Rd Zhangye Gansu Peoples R China
Because of multimedia information has huge amount of data and high redundancy, traditional encryption technology is not suitable for multimedia information encryption. Multimedia information encryption get great devel... 详细信息
来源: 评论
Improve the Privacy of AES encryption algorithm in Cloud Computing
Improve the Privacy of AES Encryption Algorithm in Cloud Com...
收藏 引用
2019 4th International Workshop on Materials Engineering and Computer Sciences(IWMECS 2019)
作者: Heng Wang Xinrui Chen School of Electronics and Information Engineering Jingchu University of Technology
This article through to the symmetrical secret key and asymmetric contrast and secret key system requirements analysis identified on the basis of AES encryption mode choice,in describing the AES encryption principle i... 详细信息
来源: 评论