咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 120 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 297 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 248 篇 工学
    • 157 篇 计算机科学与技术...
    • 84 篇 电气工程
    • 55 篇 信息与通信工程
    • 27 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 36 篇 理学
    • 19 篇 物理学
    • 16 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 297 篇 encryption algor...
  • 81 篇 cryptography
  • 27 篇 encryption
  • 24 篇 security
  • 17 篇 images
  • 16 篇 image
  • 15 篇 data security
  • 15 篇 imagery (psychot...
  • 14 篇 blockchain
  • 12 篇 decryption
  • 12 篇 chaos
  • 11 篇 image encryption
  • 10 篇 algorithms
  • 10 篇 security level
  • 9 篇 privacy protecti...
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 8 篇 internet of thin...

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang
  • 2 篇 xiaoqiang zhang

语言

  • 282 篇 英文
  • 12 篇 其他
  • 3 篇 中文
检索条件"主题词=Encryption algorithm"
297 条 记 录,以下是151-160 订阅
Image encryption algorithm Based on A New Combined Chaotic System
Image Encryption Algorithm Based on A New Combined Chaotic S...
收藏 引用
IEEE International Conference on Systems, Man, and Cybernetics
作者: C. L. Philip Chen Tong Zhang Yicong Zhou Department of Computer and information science University of Macau Department of computer and information science University of Macau
Chaotic theory has been applied to image encryption as an effective and robust technique due to its unique properties. In this paper, we introduce a new combined chaotic system, which shows better chaotic behaviors th... 详细信息
来源: 评论
The development of tiny encryption algorithm (TEA) crypto-core for mobile systems
The development of tiny encryption algorithm (TEA) crypto-co...
收藏 引用
International Conference on Electronic Devices, Systems and Applications (ICEDSA)
作者: Stephanie Ang Yee Hunn Siti Zarina binti Md. Naziri Norina binti Idris School of Microelectronic Engineering Universiti Malaysia Perlis Arau Perlis Malaysia
In this paper, a cryptographic algorithm design called Tiny encryption algorithm (TEA) is proposed in order to minimize the memory footprint and maximize the speed. The design was targeted for embedded and mobile syst... 详细信息
来源: 评论
A New Image encryption algorithm Using Truncated P-Fibonacci Bit-planes
A New Image Encryption Algorithm Using Truncated P-Fibonacci...
收藏 引用
IEEE International Conference on Systems, Man, and Cybernetics
作者: Weijia Cao Yicong Zhou C. L. Philip Chen Department of Computer and Information Science University of Macau Department of computer and Information Science University of Macau
Image encryption is an effective approach to protect privacy and security of images. This paper introduces a novel image encryption algorithm using the Truncated P-Fibonacci Bit-planes as security key images to encryp... 详细信息
来源: 评论
Performance Evaluation for DES and AES algorithms-An Comprehensive Overview
Performance Evaluation for DES and AES Algorithms-An Compreh...
收藏 引用
IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology
作者: Sriperumbuduru Srilaya Sirisha velampalli Department of computer science CR RAO AIMSCS University of Hyderabad
Now-a-days there is fast evolution of internet and network applications so information security is very much important for secure transmission of data over an electronic way. Cryptography plays a very important role i... 详细信息
来源: 评论
The Application of Quantum Communication Technology used in Electric Power Information & Communication System Confidential Transmission  19
The Application of Quantum Communication Technology used in ...
收藏 引用
19th International Conference on Advanced Communication Technology (ICACT)
作者: Liu Junwen Zhao Ziyan Hao Jiakai State Grid Informat & Telecommun Branch Beijing 100761 Peoples R China State Grid Beijing Elect Power Co Beijing 100031 Peoples R China
Electric power information system is related with the safe operation of power grid. To ensure the data of electric power information will not be eavesdropped or deciphered, we need a strict way of encryption. With the... 详细信息
来源: 评论
Security enhancement of a phase-truncation based image encryption algorithm
收藏 引用
APPLIED OPTICS 2011年 第36期50卷 6645-6651页
作者: Wang, Xiaogang Zhao, Daomu Zhejiang A&F Univ Sch Sci Linan 311300 Peoples R China Zhejiang Univ Dept Phys Hangzhou 310027 Peoples R China
The asymmetric cryptosystem, which is based on phase-truncated Fourier transforms (PTFTs), can break the linearity of conventional systems. However, it has been proven to be vulnerable to a specific attack based on it... 详细信息
来源: 评论
A novel Implementation of encryption algorithms based on FPGA Gates
A novel Implementation of Encryption Algorithms based on FPG...
收藏 引用
2016 4th International Conference on Machinery,Materials and Computing Technology(ICMMCT 2016)
作者: Huabo Zhang Hongmin Gao Xuetian Wang Xiangzhi Yu Department of Information and Electronics Beijing Institute of Technology
A novel implementation of encryption algorithms based on FPGA gates is described in this paper. The encryption algorithm is focused on different FPGA devices with the same number of cascaded NOT gates but have differe... 详细信息
来源: 评论
An Improved Fully Homomorphic encryption Scheme under the Cloud Environment  17
An Improved Fully Homomorphic Encryption Scheme under the Cl...
收藏 引用
12th Chinese Conference on Computer Supported Cooperative Work and Social Computing (ChineseCSCW)
作者: Wu, Zuowei Li, Taoshen Guangxi Univ Sch Comp Elect & Informat Nanning Peoples R China
In order to improve the efficiency of the existing homomorphic encryption method, based on the DGHV scheme, an improved fully homomorphic scheme over the integer is proposed. Under the premise of ensuring data owner a... 详细信息
来源: 评论
Image encryption scheme based on block-based confusion and multiple levels of diffusion
收藏 引用
IET COMPUTER VISION 2016年 第6期10卷 593-602页
作者: Murugan, Brindha Gounder, Ammasai Gounden Nanjappa Natl Inst Technol Dept Comp Sci & Engn Tiruchirappalli Tamil Nadu India Natl Inst Technol Dept Elect & Elect Engn Tiruchirappalli Tamil Nadu India
This study proposes a chaos-based image encryption scheme using Henon map and Lorenz equation with multiple levels of diffusion. The Henon map is used for confusion and the Lorenz equation for diffusion. Apart from th... 详细信息
来源: 评论
De-duplication Approach with Enhance Security for Integrity
De-duplication Approach with Enhance Security for Integrity
收藏 引用
International Conference on Computing Communication Control and Automation
作者: Minal Bharat Pokale Sandeep M. Chaware Computer Engineering Department MMCOE Pune India
Cloud computing becomes one of the important part of the IT-enterprise. It delivers computing application, software, hardware and computing resources to the user. So many user gets connected to the cloud because of th... 详细信息
来源: 评论