咨询与建议

限定检索结果

文献类型

  • 175 篇 会议
  • 118 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 296 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 249 篇 工学
    • 158 篇 计算机科学与技术...
    • 85 篇 电气工程
    • 56 篇 信息与通信工程
    • 27 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 37 篇 理学
    • 19 篇 物理学
    • 17 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 296 篇 encryption algor...
  • 81 篇 cryptography
  • 27 篇 encryption
  • 24 篇 security
  • 17 篇 images
  • 16 篇 image
  • 15 篇 data security
  • 15 篇 imagery (psychot...
  • 14 篇 blockchain
  • 12 篇 decryption
  • 12 篇 chaos
  • 11 篇 image encryption
  • 10 篇 algorithms
  • 10 篇 security level
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 8 篇 internet of thin...
  • 8 篇 privacy protecti...

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang
  • 2 篇 xiaoqiang zhang

语言

  • 280 篇 英文
  • 13 篇 其他
  • 3 篇 中文
检索条件"主题词=Encryption Algorithm"
296 条 记 录,以下是81-90 订阅
排序:
Efficient Video encryption using Lightweight Cryptography algorithm  3
Efficient Video Encryption using Lightweight Cryptography Al...
收藏 引用
3rd International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)
作者: Hussain, Syed Saiq Ibrahim, Muhammad Sohail Mir, Syed Zain Yasin, Sajid Majeed, Muhammad Kashif Ghani, Azfar Iqra Univ FEST Karachi Pakistan
The natural redundancy in video data due to its spatio-temporal correlation of neighbouring pixels require highly complex encryption process to successfully cipher the data. Conventional encryption methods are based o... 详细信息
来源: 评论
Study on algorithm for Grid Subdivision and encryption Based on Technology of Three Dimensional Geological Modeling
Study on Algorithm for Grid Subdivision and Encryption Based...
收藏 引用
2nd International Conference on Measurement, Instrumentation and Automation (ICMIA 2013)
作者: He, Wei Wu, Wenli Chinese Acad Geol Sci Inst Geophys & Geochem Explorat Langfang 065000 Hebei Peoples R China
To achieve 3D grid models which have a non-uniform size and varying properties, we proposed the algorithm of grid subdivision and encryption by human-computer interaction. This algorithm was the technology based on 3D... 详细信息
来源: 评论
Evaluating the Security of Logic encryption algorithms
Evaluating the Security of Logic Encryption Algorithms
收藏 引用
IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
作者: Subramanyan, Pramod Ray, Sayak Malik, Sharad Princeton Univ Dept Elect Engn Princeton NJ 08544 USA
Contemporary integrated circuits are designed and manufactured in a globalized environment leading to concerns of piracy, overproduction and counterfeiting. One class of techniques to combat these threats is logic enc... 详细信息
来源: 评论
A Comparative Study of encryption algorithms in Wireless Sensor Network
A Comparative Study of Encryption Algorithms in Wireless Sen...
收藏 引用
International Conference on Wireless Communications, Networking and Applications (WCNA)
作者: Xi, Zonghu Li, Li Shi, Guozhen Wang, Shuaibing Xidian Univ Sch Comp Sci & Technol Xian 710071 Peoples R China Beijing Elect Sci & Technol Inst Dept Elect Engn Beijing 100070 Peoples R China
With the development of the Internet of Things, the Wireless Senor Network has been paid increasing attention. It can not only perceive the physical world, collect and transmit information, but also brings new problem... 详细信息
来源: 评论
A Prototype of Electronic Toll Collection System based on encryption algorithms and Intellectual Technology
收藏 引用
International Conference on Computational Materials Science (CMS 2011)
作者: Geng, Zhang Chongqing Technol & Business Inst Chongqing Peoples R China
In the design of the proposed ETC scheme, all three major intelligent systems, such as AVC, AVI, and AVE have been included, where in each case some advanced technological features have been introduced. Moreover, incl... 详细信息
来源: 评论
Light with orbital angular momentum and encryption algorithms
Light with orbital angular momentum and encryption algorithm...
收藏 引用
Saratov Fall Meeting (SFM) on Laser Physics and Photonics XVIII;and Computational Biophysics and Analysis of Biomedical Data IV / 5th International Symposium on Optics and Biophotonics
作者: Burlov, Sergey A. Gorokhov, Alexander V. Samara Natl Res Univ 34 Moskovskoe Shosse Samara 443086 Russia
Two algorithms are presented that use the properties of twisted light to construct symmetric encryption schemes. Their possible physical realization is discussed.
来源: 评论
Performance Trade-offs of encryption algorithms For Wireless Sensor Networks
Performance Trade-offs of Encryption Algorithms For Wireless...
收藏 引用
World Congress on Computer Applications and Information Systems (WCCAIS)
作者: Trad, Abdelbasset Bahattab, Abdullah Ali Ben Othman, Soufiene Univ Sousse ISITC UR PRINCE Sousse Tunisia Coll Telecomm & Elect Jeddah Saudi Arabia
Several security mechanisms have been introduced to address the need for reliable and efficient security schemes in resource limited Wireless Sensor Networks (WSNs). Limitations in processing speed, battery power, ban... 详细信息
来源: 评论
encryption algorithms Modeling in Detecting Man in the Middle Attack in Medical Organizations
收藏 引用
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS 2022年 第8期13卷 64-76页
作者: Alnasser, Sulaiman Alsaqour, Raed Saudi Elect Univ Coll Comp & Informat Dept Informat Technol Riyadh 93499 Saudi Arabia
A cyberattack is a serious crime that could affect medical organizations. These attacks could affect medical organization sensitive data disclosure, loss of organization data, or the business's continuity. The Man... 详细信息
来源: 评论
Securing IoT devices with fast and energy efficient implementation of PRIDE and PRESENT ciphers
Cyber Security and Applications
收藏 引用
Cyber Security and Applications 2025年 3卷
作者: Dahiphale, Vijay Raut, Hrishikesh Bansod, Gaurav Dahiphale, Devendra Binghamton University Binghamton United States North Carolina State University Raleigh United States Pune Institute of Computer Technology Pune India University of Maryland Baltimore County Maryland United States
The rise of low-power, cost-efficient internet-connected devices has led to a need for lightweight cryptography. The lightweight block cipher PRIDE, designed by Martin R. Albrecht, is one of the most efficient ciphers... 详细信息
来源: 评论
A selective image encryption scheme using LICC hyperchaotic system
收藏 引用
IET IMAGE PROCESSING 2022年 第12期16卷 3342-3358页
作者: Wei, Chengjing Li, Guodong Guilin Univ Elect Technol Sch Math & Computat Sci Guilin 541004 Guangxi Peoples R China Lab Guangxi Coll & Univ Key Lab Data Anal & Computat Guilin Guangxi Peoples R China
In this paper, an improved multi-dimensional hyperchaotic system derived from the logistic map and the ICMIC based on closed-loop coupling (LICC hyperchaotic system) is proposed and it is used in the design of selecti... 详细信息
来源: 评论