咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 120 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 297 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 248 篇 工学
    • 157 篇 计算机科学与技术...
    • 84 篇 电气工程
    • 55 篇 信息与通信工程
    • 27 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 36 篇 理学
    • 19 篇 物理学
    • 16 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 297 篇 encryption algor...
  • 81 篇 cryptography
  • 27 篇 encryption
  • 24 篇 security
  • 17 篇 images
  • 16 篇 image
  • 15 篇 data security
  • 15 篇 imagery (psychot...
  • 14 篇 blockchain
  • 12 篇 decryption
  • 12 篇 chaos
  • 11 篇 image encryption
  • 10 篇 algorithms
  • 10 篇 security level
  • 9 篇 privacy protecti...
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 8 篇 internet of thin...

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang
  • 2 篇 xiaoqiang zhang

语言

  • 282 篇 英文
  • 12 篇 其他
  • 3 篇 中文
检索条件"主题词=Encryption Algorithm"
297 条 记 录,以下是31-40 订阅
排序:
Adopting Tiny encryption algorithm for Patient Healthcare Record on Smart Card
Adopting Tiny Encryption Algorithm for Patient Healthcare Re...
收藏 引用
International Conference of Computer Science and Information Technology
作者: Muhammad Rizki Adiwiganda Endro Ariyanto Rahmat Yasirandi Novian Anggis Suwastika Yoso Adi Setyoko School of Computing Telkom University Bandung Indonesia Industrial and Informatics Faculty Telkom Institute of Technology Purwokerto Indonesia
Smart Card is something that is used for data transactions quickly and practically. The definition of ”smart” is when a card has a chip implanted. The card is very helpful in the authentication and administration pr... 详细信息
来源: 评论
A Novel Bit-level Image encryption algorithm Based on Coarse-grained Chaotic Signals
A Novel Bit-level Image Encryption Algorithm Based on Coarse...
收藏 引用
International Conference on Image, Vision and Computing (ICIVC)
作者: Yujie Sun Pengfei Yan Hao Zhang Yong Zhang Department of Software North Automatic Control Technology Institute Taiyuan Shanxi China College of Information and Computer Taiyuan University of Technology Taiyuan Shanxi China
In this paper, a novel image encryption algorithm based on coarse-grained chaotic signals in which scrambling and diffusion are both covered. First, the chaotic signals are handled with unfixed coarse-grained key inst... 详细信息
来源: 评论
Enhancing Data Security of iOS Client by encryption algorithm
Enhancing Data Security of iOS Client by Encryption Algorith...
收藏 引用
2017 IEEE 第2届先进信息技术,电子与自动化控制国际会议(IAEAC 2017)
作者: Yuli Shen Hong Wang School of Information Engineering Wuhan University of Technology
iOS devices are steadily obtaining popularity of the majority of users because of its some unique advantages in recent *** can do many things that have been done on a desktop computer or laptop
来源: 评论
Calculation of encryption algorithm Combination for Video encryption using Two Layers of AHP  10
Calculation of Encryption Algorithm Combination for Video En...
收藏 引用
10th International Conference on Telecommunication Systems Services and Applications (TSSA)
作者: Mustafa, Alvin Hendrawan Bandung Inst Technol Sch Elect Engn & Informat Bandung Indonesia
Nowadays, many algorithms in cryptography area has been developed. Choosing the appropriate algorithm and dealing with its tradeoff, require a specific analysis. One of the examples is calculating the optimum encrypti... 详细信息
来源: 评论
A Fingerprint Featured Data encryption algorithm  7
A Fingerprint Featured Data Encryption Algorithm
收藏 引用
7th International Conference on Information and Communication Systems (ICICS)
作者: Al-Qassas, Raad S. Qasaimeh, Malik Al-Nouri, Hassan Princess Sumaya Univ Technol Dept Comp Sci Amman Jordan Princess Sumaya Univ Technol Dept Software Engn Amman Jordan New Horizons Comp Training Ctr Amman Jordan
In this paper, we propose a new DES variant named Hashed Data encryption Standard (or HDES for short), with an objective to enhance the limitation of static S-boxes arrangement in DES. The proposed HDES combines sever... 详细信息
来源: 评论
Digital Image encryption algorithm Design Based on Genetic Hyperchaos
收藏 引用
INTERNATIONAL JOURNAL OF OPTICS 2016年 第1期2016卷 2053724-1-2053724-14页
作者: Wang, Jian Yanshan Univ Grad Sch Qinhuangdao 066004 Peoples R China Yanshan Univ Sch Informat Sci & Engn Qinhuangdao 066004 Peoples R China First Hosp Qinhuangdao Qinhuangdao 066000 Peoples R China
In view of the present chaotic image encryption algorithm based on scrambling (diffusion is vulnerable to choosing plaintext (ciphertext) attack in the process of pixel position scrambling), we put forward a image enc... 详细信息
来源: 评论
encryption algorithms Modeling in Detecting Man in the Middle Attack in Medical Organizations
收藏 引用
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS 2022年 第8期13卷 64-76页
作者: Alnasser, Sulaiman Alsaqour, Raed Saudi Elect Univ Coll Comp & Informat Dept Informat Technol Riyadh 93499 Saudi Arabia
A cyberattack is a serious crime that could affect medical organizations. These attacks could affect medical organization sensitive data disclosure, loss of organization data, or the business's continuity. The Man... 详细信息
来源: 评论
Implementation of a block cipher algorithm for medical information security on cloud environment: using modified advanced encryption standard approach
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2023年 第13期82卷 20537-20551页
作者: Adeniyi, A. E. Abiodun, K. M. Awotunde, J. B. Olagunju, M. Ojo, O. S. Edet, N. P. Precious Cornerstone Univ Dept Comp Sci Ibadan Oyo State Nigeria Landmark Univ SDG 4 Qual Educ Grp Omu Aran Nigeria Landmark Univ SDG 9 Ind Innovat & Infrastruct Res Grp Omu Aran Nigeria Landmark Univ Dept Comp Sci Omu Aran Kwara State Nigeria Univ Ilorin Dept Comp Sci Ilorin Kwara State Nigeria Fed Univ Oye Ekiti Dept Comp Sci Oye Ekiti State Nigeria Ajayi Crowther Univ Dept Comp Sci Oyo Nigeria
The need of keeping medical information safe and secure stems from the fact that doctors rely on it to make accurate diagnoses. If this information is altered in any way, no matter how minor, there is a risk of an ina... 详细信息
来源: 评论
An Image encryption algorithm Based on Zigzag Transformation and 3-Dimension Chaotic Logistic Map  6th
An Image Encryption Algorithm Based on Zigzag Transformation...
收藏 引用
6th International Conference on Applications and Techniques in Information Security (ATIS)
作者: Li, Yuzhen Li, Xiaodong Jin, Xin Zhao, Geng Ge, Shiming Tian, Yulu Zhang, Xiaokun Zhang, Kejun Wang, Ziyi Beijing Elect Sci & Technol Inst Beijing 100070 Peoples R China GOCPCCC Key Lab Informat Secur Beijing 100070 Peoples R China Xidian Univ Xian 710071 Peoples R China Chinese Acad Sci Inst Informat Engn Beijing 100093 Peoples R China
An image encryption algorithm based on Zigzag transformation and 3-Dimension Logistic chaotic map by making use of the permutation-diffusion encryption structure is proposed. The algorithm consists of two parts: first... 详细信息
来源: 评论
Research on the Mobile Security encryption algorithm for Manufacturing Execution System  5
Research on the Mobile Security Encryption Algorithm for Man...
收藏 引用
IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER)
作者: Pan Fucheng Hu Guoliang Univ Chinese Acad Sci Beijing Peoples R China Chinese Acad Sci Shenyang Inst Automat Shenyang Peoples R China Chinese Acad Sci Shenyang Inst Automat Dept Digital Factory Shenyang Peoples R China
With the high-speed development of mobile terminal device, the mobile information application solution has been more and more common. According to the processing and manufacturing industry MES (Manufacturing Execution... 详细信息
来源: 评论