咨询与建议

限定检索结果

文献类型

  • 175 篇 会议
  • 118 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 296 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 249 篇 工学
    • 158 篇 计算机科学与技术...
    • 85 篇 电气工程
    • 56 篇 信息与通信工程
    • 27 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 37 篇 理学
    • 19 篇 物理学
    • 17 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 296 篇 encryption algor...
  • 81 篇 cryptography
  • 27 篇 encryption
  • 24 篇 security
  • 17 篇 images
  • 16 篇 image
  • 15 篇 data security
  • 15 篇 imagery (psychot...
  • 14 篇 blockchain
  • 12 篇 decryption
  • 12 篇 chaos
  • 11 篇 image encryption
  • 10 篇 algorithms
  • 10 篇 security level
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 8 篇 internet of thin...
  • 8 篇 privacy protecti...

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang
  • 2 篇 xiaoqiang zhang

语言

  • 280 篇 英文
  • 13 篇 其他
  • 3 篇 中文
检索条件"主题词=Encryption Algorithm"
296 条 记 录,以下是71-80 订阅
排序:
An adaptive approach for securing patient data in intellectual disability care with 8D Hyperchaotic DNA encryption and IWT
收藏 引用
BIOMEDICAL SIGNAL PROCESSING AND CONTROL 2025年 100卷
作者: Anisha, J. R. Teen, Y. P. Arul Univ Coll Engn Nagercoil Tamil Nadu India
Intellectual disability (ID) is a neurodevelopmental disease characterized by significant intellectual and adaptive functioning impairments. Continuous monitoring and data collection are crucial for managing this cond... 详细信息
来源: 评论
Redistributed invariant redundant fractional wavelet transform and its application in watermarking algorithm
收藏 引用
EXPERT SYSTEMS WITH APPLICATIONS 2025年 262卷
作者: Wei, Deyun Deng, Yang Xidian Univ Sch Math & Stat Xian Peoples R China
In this paper, we introduce an invariant wavelet transform with multiple parameters in fractional domain and apply it to watermarking algorithm. First, we propose a new transform called redistributed invariant redunda... 详细信息
来源: 评论
Blockchain-based optimization of operation and trading among multiple microgrids considering market fairness
收藏 引用
INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS 2025年 166卷
作者: Liu, Hao Lu, Tianguang Yang, Yueping Guo, Yu Wu, Qinzheng Xu, Xiaotong Zeng, Haibing Shandong Univ Sch Elect & Engn Jinan 250061 Peoples R China Ningbo Power Supply Co State Grid Corp China Ningbo 315000 Peoples R China
The microgrid (MG) provides a viable pathway for integrating distributed energy resources (DERs). With the development of the electricity market, the current challenge lies in guiding DERs to enter the market correctl... 详细信息
来源: 评论
Efficient privacy-preserving online medical pre-diagnosis based on blockchain
收藏 引用
JOURNAL OF SUPERCOMPUTING 2025年 第1期81卷 1-21页
作者: Zhou, Sufang Fan, Jianing Yuan, Ke Du, Xiaoyu Jia, Chunfu Henan Univ Sch Comp & Informat Engn Kaifeng 475004 Peoples R China Henan Univ Henan Prov Engn Res Ctr Spatial Informat Proc Kaifeng 475004 Peoples R China Nankai Univ Coll Cybersecur Tianjin 300350 Peoples R China
This paper proposes an online medical pre-diagnosis scheme based on blockchain. It mainly focuses on the problems faced in the medical diagnosis scheme nowadays, such as the huge scale of medical treatment, the lack o... 详细信息
来源: 评论
Privacy protection technology in e-commerce based on dilated convolution network model
收藏 引用
JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING 2025年 第1期25卷 54-66页
作者: Huang, Furong Shaoxing Univ Shangyu Coll Room 504Bldg 10Baiguan St Shaoxing 312300 Zhejiang Peoples R China
This paper aims to investigate and advance the privacy protection techniques within the e-commerce domain by leveraging the dilated convolutional network (DCN) model. It endeavors to elevate the safeguarding of user d... 详细信息
来源: 评论
Implementation of a block cipher algorithm for medical information security on cloud environment: using modified advanced encryption standard approach
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2023年 第13期82卷 20537-20551页
作者: Adeniyi, A. E. Abiodun, K. M. Awotunde, J. B. Olagunju, M. Ojo, O. S. Edet, N. P. Precious Cornerstone Univ Dept Comp Sci Ibadan Oyo State Nigeria Landmark Univ SDG 4 Qual Educ Grp Omu Aran Nigeria Landmark Univ SDG 9 Ind Innovat & Infrastruct Res Grp Omu Aran Nigeria Landmark Univ Dept Comp Sci Omu Aran Kwara State Nigeria Univ Ilorin Dept Comp Sci Ilorin Kwara State Nigeria Fed Univ Oye Ekiti Dept Comp Sci Oye Ekiti State Nigeria Ajayi Crowther Univ Dept Comp Sci Oyo Nigeria
The need of keeping medical information safe and secure stems from the fact that doctors rely on it to make accurate diagnoses. If this information is altered in any way, no matter how minor, there is a risk of an ina... 详细信息
来源: 评论
encryption of accounting data using DES algorithm in computing environment
收藏 引用
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2020年 第4期39卷 5085-5095页
作者: Wu, Yanhong Dai, Xiuqing Guangdong Ocean Univ Coll Management Cunjin Coll Zhanjiang 524094 Guangdong Peoples R China
The more and more developed network has caused more and more impact on people's life and work, providing convenient channels for people's information exchange, and then improving people's living and workin... 详细信息
来源: 评论
Charging wireless sensor network security technology based on encryption algorithms and dynamic model
收藏 引用
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS 2020年 第3期16卷 1-10页
作者: Li, Yuanming Guo, Wei Meng, Xuejun Xia, Wen State Key Lab Astronaut Dynam Xian 710043 Shaanxi Peoples R China China Xian Satellite Control Ctr Xian Shaanxi Peoples R China
With the popularization of the Internet, the related information technology is developing faster and faster, and the scale and complexity of the network are also increasing. Wireless networks cover all aspects of life... 详细信息
来源: 评论
A COMPUTER PACKAGE FOR MEASURING THE STRENGTH OF encryption algorithmS
收藏 引用
COMPUTERS & SECURITY 1994年 第8期13卷 687-697页
作者: GUSTAFSON, H DAWSON, E NIELSEN, L CAELLI, W QUEENSLAND UNIV TECHNOL FAC INFORMAT TECHNOLINFORMAT SEC RES CTRBRISBANEQLD 4001AUSTRALIA
Designers and users of encryption algorithms used in cipher systems need a systematic approach in examining their ciphers prior to use, to ensure that they are safe from crypt-analytic attack. This paper describes a c... 详细信息
来源: 评论
Analysis of some recently proposed chaos-based encryption algorithms
收藏 引用
PHYSICS LETTERS A 2001年 第6期291卷 381-384页
作者: Jakimoski, G Kocarev, L Univ Calif San Diego Inst Nonlinear Sci La Jolla CA 92093 USA
We analyze the security and performance of two recently proposed encryption algorithms designed using deterministic chaotic dynamical systems. The analysis shows not only that the encryption rates of these algorithms ... 详细信息
来源: 评论