咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 120 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 297 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 248 篇 工学
    • 157 篇 计算机科学与技术...
    • 84 篇 电气工程
    • 55 篇 信息与通信工程
    • 27 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 36 篇 理学
    • 19 篇 物理学
    • 16 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 297 篇 encryption algor...
  • 81 篇 cryptography
  • 27 篇 encryption
  • 24 篇 security
  • 17 篇 images
  • 16 篇 image
  • 15 篇 data security
  • 15 篇 imagery (psychot...
  • 14 篇 blockchain
  • 12 篇 decryption
  • 12 篇 chaos
  • 11 篇 image encryption
  • 10 篇 algorithms
  • 10 篇 security level
  • 9 篇 privacy protecti...
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 8 篇 internet of thin...

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang
  • 2 篇 xiaoqiang zhang

语言

  • 282 篇 英文
  • 12 篇 其他
  • 3 篇 中文
检索条件"主题词=Encryption algorithm"
297 条 记 录,以下是111-120 订阅
排序:
Cryptography in Quantum Computing  4th
Cryptography in Quantum Computing
收藏 引用
Future Technologies Conference (FTC)
作者: Choy, Pam Cates, Dustin Chehwan, Florent Rodriguez, Cindy Leider, Avery Tappert, Charles C. Pace Univ Seidenberg Sch Comp Sci & Informat Syst Pleasantville NY 10570 USA
Quantum cryptography is an area of intense interest, as quantum computers contain the potential to break many classical encryption algorithms. With so much on the line, it is imperative to find a new quantum encryptio... 详细信息
来源: 评论
Implementation of "Magma" and "Kuznyechik" ciphers using HIP  6
Implementation of "Magma" and "Kuznyechik" ciphers using HIP
收藏 引用
6th International Conference on Information Technology and Nanotechnology (IEEE ITNT)
作者: Borisov, Alexey Myasnikov, Evgeny Samara Natl Res Univ Dept Geoinformat & Informat Secur Samara Russia
In this paper, we present an implementation of Russian cryptographic standards using HIP, an open-source technology that allows writing a C++ code, which can be compiled for AMD and NVIDIA GPUs. The details of effecti... 详细信息
来源: 评论
A survey on Symmetric and Asymmetric Key based Image encryption
A survey on Symmetric and Asymmetric Key based Image Encrypt...
收藏 引用
International Conference on Data, Engineering and Applications (IDEA)
作者: Sanjay Kumar Binod Kumar Singh Akshita Sonika Pundir Simran Batra Rashi Joshi NIT Jamshedpur Jamshedpur India WIT Dehradun Dehradun India
Image encryption is a technique where an algorithm along with a set of characters called key encrypts the data into cipher text. The cipher text can be converted back into plaintext by decryption. This technique is em... 详细信息
来源: 评论
Image encryption using a Modified Pseudo-Random Generator
Image Encryption using a Modified Pseudo-Random Generator
收藏 引用
Emerging Trends in Information Technology and Engineering (ic-ETITE), Conference on
作者: Brijgopal Bharadwaj J Sairabanu School of Computer Science Engineering Vellore Institute of Technology Vellore India
This paper presents a new image encryption algorithm, that accepts an initial secret key and an initialization vector, to produce the encryption/decryption keys using a modified pseudo-random generator. This key is us... 详细信息
来源: 评论
A new attribute anonymity algorithm in cloud computing environment
收藏 引用
JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING 2019年 第1_suppl期19卷 S259-S267页
作者: Chen, Xi Yuan, Yuan Liu, Yani Cao, Runqiang Panzhihua Univ Panzhihua 617000 Sichuan Peoples R China Sichuan Coll Architectural Technol Deyang 610399 Sichuan Peoples R China
In order to effectively solve the problem of data security in cloud computing, a hierarchical multi-authorization attribute-based encryption (HM-ABE) scheme is proposed. The authorization center of different privilege... 详细信息
来源: 评论
Research on High-security Product Traceability Method Based on Blockchain
International Core Journal of Engineering
收藏 引用
International Core Journal of Engineering 2020年 第3期6卷 244-251页
作者: Shaoke Liu
With the rapid development of the logistics industry, the problem of product information traceability in the supply chain is becoming more and more serious. However, the traditional product traceability system has som... 详细信息
来源: 评论
Public algorithm in Reversible Data Hiding  27
Public Algorithm in Reversible Data Hiding
收藏 引用
27th Iranian Conference on Electrical Engineering (ICEE)
作者: Mohammadi, Ammar Nakhkash, Mansour Yazd Univ Dept Elect Engn Yazd Iran
Reversible data hiding (RDH) schemes provide some capacities in the host image to embed message so that message and the host image can respectively be extracted and restored at the destination with no distortion. This... 详细信息
来源: 评论
Real-time and encryption efficiency improvements of simultaneous fusion, compression and encryption method based on chaotic generators
收藏 引用
OPTICS AND LASERS IN ENGINEERING 2018年 第Mar.期102卷 59-69页
作者: Jridi, Maher Alfalou, Ayman ISEN Brest VISION L BISEN CS42807 Brest France
In this paper, enhancement of an existing optical simultaneous fusion, compression and encryption (SFCE) scheme in terms of real-time requirements, bandwidth occupation and encryption robustness is proposed. We have u... 详细信息
来源: 评论
A PRISMA-compliant systematic review and analysis on color image encryption using DNA properties
收藏 引用
COMPUTER SCIENCE REVIEW 2018年 第Aug.期29卷 14-20页
作者: Sokouti, Massoud Sokouti, Babak Mashhad Univ Med Sci Nucl Med Res Ctr Mashhad Iran Tabriz Univ Med Sci Biotechnol Res Ctr Tabriz Iran
During recent years, various encryption algorithms have been proposed for color image encryption based on DNA encoding. Image encryption is one of the most important areas of research which has taken attentions of res... 详细信息
来源: 评论
A Low Cost High Performance Polynomial Multiplier Design For FPGA Implementation
A Low Cost High Performance Polynomial Multiplier Design For...
收藏 引用
International Conference on Electronics Technology (ICET)
作者: Liejun Ma Xingjun Wu Guoqiang Bai Institute of Microelectronics Tsinghua University Beijing China
In the last few years, with the fleeting progress of quantum computer the traditional encryption technology is being threatened. Lattice based cryptography is a new post quantum cryptography which has been proved the ... 详细信息
来源: 评论