咨询与建议

限定检索结果

文献类型

  • 46 篇 期刊文献
  • 37 篇 会议

馆藏范围

  • 83 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 77 篇 工学
    • 41 篇 计算机科学与技术...
    • 26 篇 电气工程
    • 16 篇 信息与通信工程
    • 9 篇 软件工程
    • 7 篇 光学工程
    • 5 篇 材料科学与工程(可...
    • 5 篇 电子科学与技术(可...
    • 4 篇 机械工程
    • 4 篇 仪器科学与技术
    • 4 篇 控制科学与工程
    • 4 篇 化学工程与技术
    • 3 篇 网络空间安全
    • 2 篇 环境科学与工程(可...
    • 1 篇 力学(可授工学、理...
    • 1 篇 动力工程及工程热...
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 航空宇航科学与技...
  • 17 篇 理学
    • 11 篇 物理学
    • 3 篇 化学
    • 2 篇 数学
    • 1 篇 生物学
    • 1 篇 系统科学
  • 4 篇 管理学
    • 4 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 3 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
    • 1 篇 公共卫生与预防医...
  • 2 篇 教育学
    • 2 篇 教育学

主题

  • 83 篇 encryption and d...
  • 9 篇 cryptography
  • 6 篇 security
  • 5 篇 fpga
  • 4 篇 cryptosystems
  • 4 篇 elliptic curve c...
  • 4 篇 cloud computing
  • 4 篇 watermarking
  • 3 篇 internet of thin...
  • 3 篇 linear feedback ...
  • 3 篇 key generation
  • 3 篇 image processing
  • 3 篇 information secu...
  • 3 篇 aes
  • 3 篇 xilinx
  • 3 篇 ms excel
  • 2 篇 replication
  • 2 篇 data security
  • 2 篇 deep learning
  • 2 篇 image encryption

机构

  • 4 篇 univ ruse angel ...
  • 3 篇 vellore inst tec...
  • 2 篇 chinese acad sci...
  • 2 篇 univ ruse angel ...
  • 1 篇 integral univ cs...
  • 1 篇 xi an jiao tong ...
  • 1 篇 indian inst tech...
  • 1 篇 state grid corp ...
  • 1 篇 koneru lakshmaia...
  • 1 篇 university of ru...
  • 1 篇 southeast univ k...
  • 1 篇 college of techn...
  • 1 篇 department of co...
  • 1 篇 engn univ people...
  • 1 篇 department of in...
  • 1 篇 department of co...
  • 1 篇 inserm inst mine...
  • 1 篇 anna univ ramanu...
  • 1 篇 univ jordan fac ...
  • 1 篇 francis xavier e...

作者

  • 2 篇 borodzhieva adri...
  • 2 篇 mutkov valentin
  • 2 篇 lang haitao
  • 2 篇 zhao dong
  • 2 篇 deng shaogeng
  • 2 篇 liu liren
  • 2 篇 liu ximin
  • 1 篇 zou hong
  • 1 篇 ittadi ankarao
  • 1 篇 zhang xian-ming
  • 1 篇 aljawarneh shadi
  • 1 篇 gerardo bobby d.
  • 1 篇 kalaichelvi v.
  • 1 篇 pan dengfeng
  • 1 篇 qin weiping
  • 1 篇 meng jinyu
  • 1 篇 qin lele
  • 1 篇 syed s. rizvi
  • 1 篇 ortegren jonas
  • 1 篇 haroon mohd.

语言

  • 72 篇 英文
  • 8 篇 其他
  • 4 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"主题词=Encryption And Decryption"
83 条 记 录,以下是1-10 订阅
排序:
An efficient poly-quantum integrity key generation based multi-user access control encryption and decryption framework for homogeneous and heterogeneous cloud EHR databases
收藏 引用
INFORMATION SECURITY JOURNAL 2025年
作者: Garigipati, Nagababu Srithar, S. Krishna Reddy, V Koneru Lakshmaiah Educ Fdn Dept Comp Sci & Engn Vaddeswaram Andhra Prades India
Cloud data security is a critical concern in the healthcare industry, particularly when it comes to protecting electronic health records (EHRs). To ensure that only authorized parties have access to sensitive patient ... 详细信息
来源: 评论
Chaotic encryption and decryption of JPEG image
收藏 引用
OPTIK 2014年 第2期125卷 717-720页
作者: Zhang, Dinghui Zhang, Fengdeng Univ Shanghai Sci & Technol Sch Opt Informat & Comp Engn Shanghai Key Lab Modern Opt Syst Shanghai 200093 Peoples R China
According to encrypting principles of digital images, integrating the characteristic of JPEG image, and using discrete chaotic sequence, this paper has studied encryption and decryption of JPEG image, and has compared... 详细信息
来源: 评论
Digital Image encryption and decryption Algorithm Based on Wavelet Transform and Chaos System
Digital Image Encryption and Decryption Algorithm Based on W...
收藏 引用
2016 IEEE Advanced Information Management,Communicates,Electronic and Automation Control Conference(IMCEC 2016)
作者: Xiaofeng Li Yinhui Zhang Department of Information Engineering Renai College of Tianjin University Department of SEL Samsung Mobile R&D Center China-Tianjin
During the transmission of digital image,in view of the security problem,use 2-D discrete wavelet transform and chaos system to realize the image encryption and *** the target image is encrypted,firstly,the ‘bior3.7&... 详细信息
来源: 评论
Analytical Study of Hybrid Techniques for Image encryption and decryption
收藏 引用
SENSORS 2020年 第18期20卷 5162.-5162.页
作者: Chowdhary, Chiranji Lal Patel, Pushpam Virenbhai Kathrotia, Krupal Jaysukhbhai Attique, Muhammad Perumal, Kumaresan Ijaz, Muhammad Fazal Vellore Inst Technol Sch Informat Technol & Engn Vellore 632014 Tamil Nadu India Vellore Inst Technol Sch Comp Sci & Engn Vellore 632014 Tamil Nadu India Sejong Univ Dept Software Seoul 05006 South Korea Sejong Univ Dept Intelligent Mech Engn Seoul 05006 South Korea
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced encryption Sta... 详细信息
来源: 评论
Plant-Inspired Multifunctional Fluorescent Hydrogel: A Highly Stretchable and Recoverable Self-Healing Platform with Water-Controlled Adhesiveness for Highly Effective Antibacterial Application and Data encryption-decryption
收藏 引用
ACS APPLIED MATERIALS & INTERFACES 2020年 第52期12卷 57686-57694页
作者: Wang, Nan Yu, Kang-Kang Li, Kun Li, Meng-Jie Wei, Xi Yu, Xiao-Qi Sichuan Univ Coll Chem Key Lab Green Chem & Technol Minist Educ Chengdu 610064 Peoples R China Sun Yat Sen Univ Affiliated Stomatol Hosp Guanghua Sch Stomatol Guangdong Prov Key Lab StomatolOperat Dent & End Guangzhou 510055 Guangdong Peoples R China
In recent years, hydrogels as an attractive class of intelligent soft materials have been applied in various advanced fields, including electronic materials, wearable devices, and wound dressing materials. However, it... 详细信息
来源: 评论
The process analysis of encryption and decryption based on process dependency graphs
The process analysis of encryption and decryption based on p...
收藏 引用
2013 International Conference on Sport Science and Computer Science (CCCS 2013)
作者: Rui Chang Liehui Jiang Hongqi He Yun Zeng State Key Laboratory of Mathematic Engineering and Advanced Computing
At present,the research on reverse analysis of encrypting and decrypting process pays more attention to cryptographic algorithms *** is no mature theory or tools for the entire process analysis of encryption and *** o... 详细信息
来源: 评论
FSPAlgorithm for encryption/decryption
FSPAlgorithm for Encryption/Decryption
收藏 引用
International Conference on Computing, Communications and Networking
作者: Kalaichelvi, V. Chandrasekaran, R. M. Sastra Univ SRC Kumbakonam India Anna Univ Trichy India
Cryptography is one of the most important areas in the computer industry. encryption allows an application to secure its data from being accessed by hackers. This paper developed and designed an algorithm for encrypti... 详细信息
来源: 评论
High-speed encryption & decryption System Based on SM4 Algorithm
收藏 引用
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS 2016年 第9期10卷 1-8页
作者: Lv Qian Li Li Cao Yan-yan Binzhou Polytech Sch Elect Engn Binzhou Peoples R China Binzhou Polytech Binzhou Peoples R China Binzhou Polytech Dept Elect Engn Binzhou Peoples R China
Nowadays, the network transmission and video encryption areas have urgently needed high-speed encryption systems for SM4 algorithm. To speed up the SM4 system in small area, three aspects in existing system is analyze... 详细信息
来源: 评论
Privacy-preserving ADP for secure tracking control of AVRs against unreliable communication
收藏 引用
FRONTIERS IN NEUROROBOTICS 2025年 19卷 1549414页
作者: Zhang, Kun Han, Kezhen Hu, Zhijian Tan, Guoqiang Beihang Univ Sch Astronaut Beijing Peoples R China Univ Jinan Sch Elect Engn Jinan Peoples R China Univ Toulouse LAAS CNRS Toulouse France Loughborough Univ Dept Aeronaut & Automot Engn Loughborough England
In this study, we developed an encrypted guaranteed-cost tracking control scheme for autonomous vehicles or robots (AVRs), by using the adaptive dynamic programming technique. To construct the tracking dynamics under ... 详细信息
来源: 评论
A Compact and Efficient Hardware Accelerator for RNS-CKKS En/Decoding and En/decryption
收藏 引用
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS 2025年 第1期72卷 243-247页
作者: Wang, Jianfei Yang, Chen Hou, Jia Zhang, Fahong Meng, Yishuo Su, Yang Liu, Leibo Xi An Jiao Tong Univ Sch Microelect Xian 710049 Peoples R China Engn Univ Peoples Armed Police Sch Cryptog Engn Xian 710086 Peoples R China Tsinghua Univ Sch Integrated Circuits Beijing 100084 Peoples R China
To accelerate RNS-CKKS, little attention is paid to the acceleration of the operations on the edge-client. However, the devices used by the edge-client are often low-end and have limited resources and computing power,... 详细信息
来源: 评论