咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 102 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 279 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 235 篇 工学
    • 151 篇 计算机科学与技术...
    • 80 篇 电气工程
    • 53 篇 信息与通信工程
    • 24 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 16 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 30 篇 理学
    • 16 篇 数学
    • 13 篇 物理学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
    • 2 篇 工商管理
  • 13 篇 医学
    • 8 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 279 篇 encryption algor...
  • 71 篇 cryptography
  • 28 篇 encryption
  • 22 篇 security
  • 15 篇 data security
  • 15 篇 images
  • 14 篇 blockchain
  • 13 篇 imagery (psychot...
  • 13 篇 chaos
  • 12 篇 image
  • 11 篇 image encryption
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 9 篇 decryption
  • 8 篇 internet of thin...
  • 8 篇 privacy protecti...
  • 8 篇 authentication
  • 8 篇 cloud computing
  • 7 篇 chaotic systems

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 bandung inst tec...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...
  • 1 篇 dept. of compute...
  • 1 篇 nmu fac artiller...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 li haifeng
  • 2 篇 li jinqing
  • 2 篇 nan zhang
  • 2 篇 li ju
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 di xiaoqiang
  • 2 篇 hu guoliang
  • 2 篇 xiaoqiang zhang
  • 2 篇 susilo willy

语言

  • 269 篇 英文
  • 7 篇 其他
  • 3 篇 中文
检索条件"主题词=Encryption algorithm"
279 条 记 录,以下是101-110 订阅
排序:
The new lightweight encryption mechanism for large media signal processing system in global content delivery network
The new lightweight encryption mechanism for large media sig...
收藏 引用
International Conference on Information Technology and Computer Application Engineering (ITCAE)
作者: Heo, Juseung Park, Chulwoo Kim, Keecheon Ok, Kisang Konkuk Univ Dept Comp Sci & Engn Seoul South Korea KT Corp Seoul South Korea
GCDN (Global Content Delivery Networks) is supposed to provide contents quickly through the nearest cache server which can reduce the load of a cache server as the user's contents request. Recently, high-capacity ... 详细信息
来源: 评论
PWLCM Based Image encryption Through Compressive Sensing
PWLCM Based Image Encryption Through Compressive Sensing
收藏 引用
IEEE Recent Advances in Intelligent Computational Systems (RAICS)
作者: Abhishek George, Sudhish N. Deepthi, P. P. Natl Inst Technol Dept Elect & Commun Engn Calicut 673601 Kerala India
In this paper, compressive sensing is combined with a chaotic key based generation of measurement matrix to provide an effective encryption algorithm for multimedia security. Block-based compressive sensing provides a... 详细信息
来源: 评论
Multicore encryption and Authentication on a Reconfigurable Hardware  2
Multicore Encryption and Authentication on a Reconfigurable ...
收藏 引用
IEEE 2nd International Conference on Recent Trends in Information Systems (ReTIS)
作者: Ghosh, Saheli Das, Subha Jyoti Paul, Rourab Chakrabarti, Amlan Comp Sci & Engn RCC Inst Technol 2012 2014 Kolkata W Bengal India Univ Calcutta AK Choudhury Sch Informat Technol Kolkata W Bengal India
Security has always been the toughest challenge in data communication, at the same time it is the biggest necessity in transmitting confidential data. Sensitive data are often at stake when they are deployed in a netw... 详细信息
来源: 评论
Image information hiding encryption using chaotic sequence
Image information hiding encryption using chaotic sequence
收藏 引用
11th International Conference on Knowledge-Based Intelligent Informational and Engineering Systems/17th Italian Workshop on Neural Networks
作者: Liu, Zhen Xi, Lifeng Zhejiang Wanli Univ Sch Comp Sci & Informat Technol Ningbo 315100 Zhejiang Peoples R China
In this paper, we propose a new image watermark algorithm of information hiding scheme based on chaotic encryption. Chaotic sequence is regarded as a noise-like spread sequence, and the secret signal to be transmitted... 详细信息
来源: 评论
A New Image Stream encryption Technique  58
A New Image Stream Encryption Technique
收藏 引用
IEEE 58th International Midwest Symposium on Circuits and Systems (MWSCAS)
作者: Hassan, Firas Limbird, Michael Ullagaddi, Vishwanath Devabhaktuni, Vijay Ohio No Univ Dept Elec & Comp Engn & Comp Sc Ada OH 45810 USA Univ Toledo Dept Elec & Comp Engn & Comp Sc Toledo OH 43606 USA
This paper introduces a self-synchronous stream cipher with a considerable key space. In the proposed technique, the parity bit plane of a public image is used to encrypt the message. Simulation results showed that th... 详细信息
来源: 评论
The design of encryption system based on RC5 arithmetic
The design of encryption system based on RC5 arithmetic
收藏 引用
International Conference on Advanced Design and Manufacturing Engineering (ADME 2011)
作者: Liang, SongFeng Dong, ZhuRong Qiu, Hao Shenzhen Polytech Sch Automot & Transportat Engn Shenzhen Guangdong Peoples R China
This paper includes some conceptions of symmetrical cryptology such as " Liner Feed Back Shift Register"(LFSR) and RC5 arithmetic. The paper also introduces the application of symmetrical cryptology in encry... 详细信息
来源: 评论
Design of A Creative encryption Approach Based On Pataphysics  3
Design of A Creative Encryption Approach Based On Pataphysic...
收藏 引用
3rd International Conference on Trustworthy Systems and their Applications (TSA)
作者: Wang, Xuan Zhang, Lu Yang, Hongji Bath Spa Univ Ctr Creat Comp Bath Avon England
encryption algorithms are widely used to enhance the data confidentiality and integrity in software systems. Most of the conventional encryption algorithms are designed based on mathematical methods. Sometimes there a... 详细信息
来源: 评论
Implementation of BLAKE 256 Hash function for Password encryption and Parallel CRC
Implementation of BLAKE 256 Hash function for Password encry...
收藏 引用
Proceedings of Online International Conference on Green Engineering and Technologies (IC-GET)
作者: Fernandes, Floyd Gupta, Ritu Sivanantham, S. Sivasankaran, K. VIT Univ Sch Elect Engn Vellore Tamil Nadu India
One of the major sources of information in recent times is the internet, which facilitates the exchange of information between thousands of people at any instant. The transmission of sensitive data such as passwords m... 详细信息
来源: 评论
Ultra-low Power encryption Engine for Wireless Implantable Medical Devices
Ultra-low Power Encryption Engine for Wireless Implantable M...
收藏 引用
55th IEEE International Midwest Symposium on Circuits and Systems (MWSCAS)
作者: Hosseini-Khayat, Saied Bahmanyar, Parvin Rahiminezhad, Ehsan Sawan, Mohamad Ferdowsi Univ Mashhad Dept Elect Engn Digital Syst Design Lab Mashhad Iran Polytechn Montreal Dept Elect Engn Polystim Neurotechnol Lab Montreal PQ H3C 3A7 Canada
Wireless implantable medical devices are expected to perform cryptographic processing at an absolutely low level of power consumption. This paper presents the design of an ultra-low power ASIC core implementing the PR... 详细信息
来源: 评论
Attribute-Based Online/Offline encryption in Smart Grid  24
Attribute-Based Online/Offline Encryption in Smart Grid
收藏 引用
International Conference on Computer Communications and Networks ICCCN
作者: Wang, Zhiwei Chen, Feng Xia, Aidong Nanjing Univ Posts & Telecommun Sch Comp Sci Nanjing 210023 Jiangsu Peoples R China
A smart grid is a modernized electrical grid that uses distribution networks to deliver electricity. It aims to gather and act on information, such as information about the behaviors of grid entities, in an automated ... 详细信息
来源: 评论