咨询与建议

限定检索结果

文献类型

  • 281 篇 会议
  • 105 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 391 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 336 篇 工学
    • 287 篇 计算机科学与技术...
    • 136 篇 软件工程
    • 107 篇 信息与通信工程
    • 88 篇 控制科学与工程
    • 86 篇 电气工程
    • 52 篇 网络空间安全
    • 32 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 24 篇 交通运输工程
    • 24 篇 安全科学与工程
    • 16 篇 动力工程及工程热...
    • 14 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 6 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 137 篇 理学
    • 90 篇 数学
    • 42 篇 物理学
    • 16 篇 统计学(可授理学、...
    • 15 篇 化学
    • 11 篇 系统科学
  • 61 篇 管理学
    • 54 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 10 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 391 篇 encryption algor...
  • 17 篇 cryptography
  • 11 篇 security
  • 7 篇 cloud computing
  • 5 篇 internet of thin...
  • 5 篇 elliptic curve c...
  • 5 篇 iot
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 data security
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 308 篇 英文
  • 79 篇 其他
  • 6 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=Encryption Algorithms"
391 条 记 录,以下是61-70 订阅
排序:
Design of Image encryption Technique Using MSE Approach  14th
Design of Image Encryption Technique Using MSE Approach
收藏 引用
14th International Conference on Applications and Techniques in Information Security, ATIS 2024
作者: Manikandan, C. Rabinson, A. Prince Devibala, A. Sivanesh, M. Karunyaa, S. Rajesh, A. School of Electrical and Electronics Engineering SASTRA Deemed University Tamil Nadu Thanjavur613401 India
The recent bloom in digital technology and the internet has created many ways to share information. The images are the most commonly used to share the information. Securely sharing of images is essential. Image encryp... 详细信息
来源: 评论
Protection of IoT networks: cryptographic solutions for cybersecurity management  3
Protection of IoT networks: cryptographic solutions for cybe...
收藏 引用
3rd International Conference on Cyber Hygiene and Conflict Management in Global Information Networks, CH and CMiGIN 2024
作者: Faure, Emil Rozlomii, Inna Yarmilko, Andrii Naumenko, Serhii Cherkasy State Technological University Shevchenko Blvd. 460 Cherkasy18006 Ukraine Kyiv03142 Ukraine Bohdan Khmelnytsky National University of Cherkasy Shevchenko Blvd. 81 Cherkasy18031 Ukraine
In the modern world, where the Internet of Things (IoT) is gaining increasing prevalence and importance, the issue of data security becomes a key challenge for both organizations and individual users. With the growing... 详细信息
来源: 评论
A Data Migration Scheme Based on State Secret Algorithm
A Data Migration Scheme Based on State Secret Algorithm
收藏 引用
2025 Asia-Europe Conference on Cybersecurity, Internet of Things and Soft Computing, CITSC 2025
作者: Xing, Xiaokui Li, Shukun An, Ran Hu, Leilei Beijing Smartchip Microelectronics Technology Company Limited Beijing China
Improper data migration and use will have the risk of information leakage, this article introduces a data migration and use scheme, which is based on state secret algorithm. In different platforms of data migration sc... 详细信息
来源: 评论
Performance Comparison: Software vs. Hardware Implementation of Novel S-Box Designed to Resist Power Analysis Attack
Performance Comparison: Software vs. Hardware Implementation...
收藏 引用
International Conference on Applications in Electronics Pervading Industry, Environment and Society, APPLEPIES 2024
作者: Mirigaldi, Mattia Martina, Maurizio Masera, Guido Politecnico di Torino Turin Italy
The Advanced encryption Standard (AES) is the only approved symmetric encryption algorithm by security agencies such as the National Institute of Standards and Technology (NIST). The algorithm is designed to be fast a... 详细信息
来源: 评论
The Smart and Secured Communication Using Applied Cryptography algorithms  5th
The Smart and Secured Communication Using Applied Cryptograp...
收藏 引用
5th International Conference on Data Science, Machine Learning and Applications, ICDSMLA 2023
作者: Agarwal, Trapty Jebakumari, S. Adlin Hemlata Ayesha, Amreen Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India Department of Computer Science and Information Technology Jain University Karnataka Bangalore India Department of Computer Science & Engineering School of Engineering and Computing Dev Bhoomi Uttarakhand University Manduwala Dehradun Navgaon India School of Computer Science and Engineering Presidency University Karnataka Bengaluru India
This paper describes the implementation of a at ease communication device the usage of an implemented cryptography algorithm. The gadget is designed to provide comfy statistics and voice communique between endpoints u... 详细信息
来源: 评论
Cryptanalysis of an Efficient Signature Based on Isotropic Quadratic Forms  16th
Cryptanalysis of an Efficient Signature Based on Isotropi...
收藏 引用
16th International Workshop on Post-Quantum Cryptography, PQCrypto 2025
作者: Bambury, Henry Nguyen, Phong Q. DIENS École normale supérieure PSL University CNRS Inria Paris France DGA Paris France
We present a key-recovery attack on DEFI, an efficient signature scheme proposed recently by Feussner and Semaev, and based on isotropic quadratic forms, borrowing from both multivariate and lattice cryptography. Our ... 详细信息
来源: 评论
Implementing Cryptographic algorithms for Securing Online Transactions  5th
Implementing Cryptographic Algorithms for Securing Online Tr...
收藏 引用
5th International Conference on Data Science, Machine Learning and Applications, ICDSMLA 2023
作者: Bhuvana, J. Bhatt, Rahul Metre, Prakash B. Mishra, Awakash Karnataka Bangalore India Department of Computer Science and Engineering School of Engineering and Computing Dev Bhoomi Uttarakhand University Navgaon Manduwala Dehradun India School of Computer Science and Engineering Presidency University Karnataka Bengaluru India Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India
Cryptographic algorithms are critical in securing online transactions. They provide relaxed verbal exchange channels for fairly touchy statistics that wishes to be reliably transmitted among a couple of remote events.... 详细信息
来源: 评论
AESHA3: Efficient and Secure Sub-Key Generation for AES Using SHA-3  14th
AESHA3: Efficient and Secure Sub-Key Generation for AES Us...
收藏 引用
14th EAI International Conference on Broadband Communications, Networks, and Systems, BROADNETS 2024
作者: Soni, Ankush Sahay, Sanjay K. Mehta, Parit Department of Computer Science and Information Systems BITS Pilani K. K. Birla Goa Campus Zuarinagar India
Advanced encryption Standard (AES) is one of the most widely used symmetric cipher for the confidentiality of data. Also it is used for other security services, viz. integrity, authentication and key establishment. Ho... 详细信息
来源: 评论
Research on identification of domestic commercial block cipher algorithms based on deep learning  4
Research on identification of domestic commercial block ciph...
收藏 引用
4th International Conference on Computer Vision, Application, and Algorithm, CVAA 2024
作者: Li, Li Chen, Jun School of Computer Science Chengdu University of Information Technology 24 Block 1 Xuefu Road Chengdu610225 China
With the widespread application of domestic commercial cryptographic algorithms and the advancement of commercial cryptographic application evaluation, the compliance of these algorithms has garnered significant atten... 详细信息
来源: 评论
Detection of Unknown Darknet Traffic with Random Forest  16th
Detection of Unknown Darknet Traffic with Random Forest
收藏 引用
16th International Conference on Genetic and Evolutionary Computing, ICGEC 2024
作者: Lee, Dong-Yu Nguyen, Thanh-Lam Shieh, Chin-Shiuh Horng, Mong-Fong Tsai, Casper Miu, Denis National Kaohsiung University of Science and Technology Kaohsiung Taiwan Auray Technology Corp. Taoyuan Taiwan Genie Networks Ltd. Taipei Taiwan
Darknet refers to an overlay network that requires the use of special software to access. Tor (The Onion Router) is one of the software used to access the darknet. Tor uses unique routing methods and encryption algori... 详细信息
来源: 评论