咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 102 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 279 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 235 篇 工学
    • 151 篇 计算机科学与技术...
    • 80 篇 电气工程
    • 53 篇 信息与通信工程
    • 24 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 16 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 30 篇 理学
    • 16 篇 数学
    • 13 篇 物理学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
    • 2 篇 工商管理
  • 13 篇 医学
    • 8 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 279 篇 encryption algor...
  • 71 篇 cryptography
  • 28 篇 encryption
  • 22 篇 security
  • 15 篇 data security
  • 15 篇 images
  • 14 篇 blockchain
  • 13 篇 imagery (psychot...
  • 13 篇 chaos
  • 12 篇 image
  • 11 篇 image encryption
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 9 篇 decryption
  • 8 篇 internet of thin...
  • 8 篇 privacy protecti...
  • 8 篇 authentication
  • 8 篇 cloud computing
  • 7 篇 chaotic systems

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 bandung inst tec...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...
  • 1 篇 dept. of compute...
  • 1 篇 nmu fac artiller...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 li haifeng
  • 2 篇 li jinqing
  • 2 篇 nan zhang
  • 2 篇 li ju
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 di xiaoqiang
  • 2 篇 hu guoliang
  • 2 篇 xiaoqiang zhang
  • 2 篇 susilo willy

语言

  • 269 篇 英文
  • 7 篇 其他
  • 3 篇 中文
检索条件"主题词=Encryption algorithm"
279 条 记 录,以下是91-100 订阅
Medical image encryption scheme based on self-verification matrix
收藏 引用
IET IMAGE PROCESSING 2021年 第12期15卷 2787-2798页
作者: Man, Zhenlong Li, Jinqing Di, Xiaoqiang CUST Sch Comp Sci & Technol Changchun 130022 Peoples R China CUST Prov Key Lab Network & Informat Secur Changchun 130022 Peoples R China CUST Informat Ctr Changchun 130022 Jilin Peoples R China
To mitigate the shortcomings of existing medical image encryption algorithms, including a lack of anti-tampering methods and security, this report presents an anti-tampering encryption algorithm for medical images tha... 详细信息
来源: 评论
FPGA Implementation of encryption algorithms Based on Residual Polynomials
FPGA Implementation of Encryption Algorithms Based on Residu...
收藏 引用
IEEE International Conference on Electronics and Nanotechnology (ELNANO)
作者: Maksat Kalimoldayev Sakhybay Tynymbayev Miras Magzom Dana Tananova Sergey E. Lyshevski Information Security laboratory Institute of Information and Computational Technologies SC MES RK Almaty Republic of Kazahstan Rochester Institute of Technology Rochester NY USA
This paper describes an encryption algorithm based on a polynomial system of residual classes. We study the FPGA bitstream implementation on the Xilinx and 16-nm UltraScale™ ASIC architecture which enables floating-po... 详细信息
来源: 评论
A PRISMA-compliant systematic review and analysis on color image encryption using DNA properties
收藏 引用
COMPUTER SCIENCE REVIEW 2018年 29卷 14-20页
作者: Sokouti, Massoud Sokouti, Babak Mashhad Univ Med Sci Nucl Med Res Ctr Mashhad Iran Tabriz Univ Med Sci Biotechnol Res Ctr Tabriz Iran
During recent years, various encryption algorithms have been proposed for color image encryption based on DNA encoding. Image encryption is one of the most important areas of research which has taken attentions of res... 详细信息
来源: 评论
Synchronization between different hyper chaotic systems and dimensions of cellular neural network and its design in audio encryption
收藏 引用
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS 2019年 第3期22卷 S7423-S7434页
作者: Li, Guodong Pu, Yue Yang, Bing Zhao, Jing Xinjiang Univ Finance & Econ Dept Appl Math Urumqi 830012 Peoples R China Xinjiang Univ Finance & Econ Res Ctr Xinjiang Social & Econ Stat Urumqi 830012 Xinjiang Peoples R China
In order to discuss the synchronization characteristic of a class of the cellular neural network and Lorenz hyper chaotic systems. This paper puts forward on the control method between different chaotic and dimensions... 详细信息
来源: 评论
A multiphase encryption scheme using RSA, modified RMAC and Chen's hyperchaotic map
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2023年 第19期83卷 57059-57088页
作者: Singh, Deep Kumar, Sandeep Cent Univ Punjab Dept Math & Stat Bathinda 151401 India Cent Univ Jammu Dept Math Jammu 181143 India
In the present time of increasing digital communication, the images are widely used over the multimedia networks for sharing of information. At the same time to ensure the security of images during transmission of dat... 详细信息
来源: 评论
Data encryption algorithms for Internet-based Real-Time Systems
Data Encryption Algorithms for Internet-based Real-Time Syst...
收藏 引用
2004 International Symposium on Distributed Computing and Applications to Business, Engineering and Science
作者: Li Hongyan~(1,2),Shuang H.Yang~(1,3),and Tan LianSheng~1 1 Department of Computer Science,Central China Normal University,Wuhan,China. 2 Department of Computer and Electronic Science,Hubei University of Economics,Wuhan,China 3 Department of Computer Science,Loughborough University,Loughborough,Leicestershire LE113TU,UK
In recent years,the Intemet has proved to be a powerful tool for real-time ***,security risk of the Intemet communication still stops people to bring the real-time application into a *** work has so far been done in d... 详细信息
来源: 评论
Image encryption scheme based on block-based confusion and multiple levels of diffusion
收藏 引用
IET COMPUTER VISION 2016年 第6期10卷 593-602页
作者: Murugan, Brindha Gounder, Ammasai Gounden Nanjappa Natl Inst Technol Dept Comp Sci & Engn Tiruchirappalli Tamil Nadu India Natl Inst Technol Dept Elect & Elect Engn Tiruchirappalli Tamil Nadu India
This study proposes a chaos-based image encryption scheme using Henon map and Lorenz equation with multiple levels of diffusion. The Henon map is used for confusion and the Lorenz equation for diffusion. Apart from th... 详细信息
来源: 评论
Research on Big Data encryption algorithms Based on Data Deduplication Technology
Research on Big Data Encryption Algorithms Based on Data Ded...
收藏 引用
International Conference on Electronic Engineering and Informatics (EEI)
作者: Zhengxiong Mao Yongjun Xue Huan Wang Wei Ou Yunnan Power Grid Co. Ltd. Kunming China
In recent years, with the continuous growth of science and technology in our country, we are exposed to more and more information. Computers are gradually coming into people's lives and constantly changing people&... 详细信息
来源: 评论
Dynamical Analysis of Novel Memristor Chaotic System and DNA encryption Application
收藏 引用
IRANIAN JOURNAL OF SCIENCE AND TECHNOLOGY-TRANSACTIONS OF ELECTRICAL ENGINEERING 2020年 第1期44卷 449-460页
作者: Sun, Junwei Yang, Qinfei Wang, Yanfeng Zhengzhou Univ Light Ind Coll Elect & Informat Engn Zhengzhou 450002 Peoples R China
In this paper, a new circuit which can include a capacitor, an inductor and a novel nonlinear memristor is designed. Complex dynamics and special characters are investigated by changing three parameters for the design... 详细信息
来源: 评论
Secure H.264 Video Coding Using AES/CFB/PKCS5 Padding encryption on Various Video Frames (I, P, B)  10
Secure H.264 Video Coding Using AES/CFB/PKCS5 Padding Encryp...
收藏 引用
10th International Conference on Telecommunication Systems Services and Applications (TSSA)
作者: Adiguna, Tahta Hendrawan Bandung Inst Technol Sch Elect Engn & Informat Bandung Indonesia
Video applications are essential nowadays. Even though almost everyone has access to it right now, the means and ability to access it is not uniform. Some of the important aspects to consider are the bandwidth availab... 详细信息
来源: 评论