咨询与建议

限定检索结果

文献类型

  • 175 篇 会议
  • 118 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 296 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 249 篇 工学
    • 158 篇 计算机科学与技术...
    • 85 篇 电气工程
    • 56 篇 信息与通信工程
    • 27 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 37 篇 理学
    • 19 篇 物理学
    • 17 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 296 篇 encryption algor...
  • 81 篇 cryptography
  • 27 篇 encryption
  • 24 篇 security
  • 17 篇 images
  • 16 篇 image
  • 15 篇 data security
  • 15 篇 imagery (psychot...
  • 14 篇 blockchain
  • 12 篇 decryption
  • 12 篇 chaos
  • 11 篇 image encryption
  • 10 篇 algorithms
  • 10 篇 security level
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 8 篇 internet of thin...
  • 8 篇 privacy protecti...

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang
  • 2 篇 xiaoqiang zhang

语言

  • 280 篇 英文
  • 13 篇 其他
  • 3 篇 中文
检索条件"主题词=Encryption algorithm"
296 条 记 录,以下是161-170 订阅
排序:
How to encrypt a graph
收藏 引用
INTERNATIONAL JOURNAL OF PARALLEL EMERGENT AND DISTRIBUTED SYSTEMS 2020年 第6期35卷 668-681页
作者: Akl, Selim G. Queens Univ Sch Comp Kingston ON K7L 3N6 Canada
An algorithm is described for encrypting a graph to be transmitted securely from a sender to a receiver. In communications terminology, "the graph is the message": its vertices, its edges, and its edge weigh... 详细信息
来源: 评论
A visual DNA compilation of Rossler system and its application in color image encryption
收藏 引用
CHAOS SOLITONS & FRACTALS 2023年 第1期174卷
作者: Zou, Chengye Wang, Lin Yanshan Univ Coll Informat Sci & Engn Qinhuangdao 066004 Peoples R China Dalian Univ Technol Fac Elect Informat & Elect Engn Dalian 116024 Peoples R China Informedia Elect Co Ltd Dalian Peoples R China
This paper proposes the use of visual DNA compilation for the Ro & BULL;ssler chaotic system in the context of semi synthetic biology, which has promising prospects for the development of next-generation computers... 详细信息
来源: 评论
Securecipher: An instantaneous synchronization stream encryption system for insider threat data leakage protection
收藏 引用
EXPERT SYSTEMS WITH APPLICATIONS 2024年 254卷
作者: Montano, Isabel Herrera Diaz, Juan Ramos Aranda, Jose Javier Garcia Molina-Cardin, Sergio Lopez, Juan Jose Guerrero Diez, Isabel de la Torre Univ Valladolid Dept Signal Theory & Commun & Telemat Engn Paseo Belen 15 Valladolid 47011 Spain Nokia Dept Innovat Maria Tubau St 9 Madrid 28050 Spain
The paper addresses the persistent challenge of insider threat in cybersecurity. Despite advancements in detection and prevention technologies and approaches, the complexity of digital environments and the ingenuity o... 详细信息
来源: 评论
Face Image encryption Using Fuzzy K2DPCA and Chaotic MapReduce
收藏 引用
TEHNICKI VJESNIK-TECHNICAL GAZETTE 2024年 第4期31卷 1143-1153页
作者: Luo, Yunxiao Li, Ju Chongqing Open Univ Chongqing 401520 Peoples R China Chongqing Technol & Business Inst Chongqing 401520 Peoples R China
As technology continues to advance, safeguarding personal privacy and information security has become increasingly critical. Facial image encryption algorithms involve encrypting and decrypting facial images to preven... 详细信息
来源: 评论
Research on Medical Data Storage and Sharing Model Based on Blockchain  7
Research on Medical Data Storage and Sharing Model Based on ...
收藏 引用
IEEE/ACM 7th Symposium on Edge Computing (SEC)
作者: Zhao, Jian Qiang, Wenqian Zhao, Zisong An, Tianbo Kuang, Zhejun Xu, Dawei Shi, Lijuan Changchun Univ Coll Network Secur Changchun Peoples R China Changchun Univ Coll Comp Sci & Technol Changchun Peoples R China Changchun Univ Coll Elect Informat Engn Changchun Peoples R China
With the process of medical informatization, medical diagnosis results are recorded and shared in the form of electronic data in the computer. However, the security of medical data storage can not be effectively prote... 详细信息
来源: 评论
A new n-dimensional conservative chaos based on Generalized Hamiltonian System and its' applications in image encryption
收藏 引用
CHAOS SOLITONS & FRACTALS 2022年 第0期154卷 111693-111693页
作者: Liu, Xilin Tong, Xiaojun Wang, Zhu Zhang, Miao Harbin Inst Technol Sch Comp Sci & Technol Weihai 264209 Peoples R China Harbin Inst Technol Sch Informat Sci & Engn Weihai 264209 Peoples R China
In view of the problem that dissipative chaos has attractors and is easy to be attacked by reconstruction, which leads to the security defects of encryption algorithm based on dissipative chaos, we design a new genera... 详细信息
来源: 评论
Overview of Image encryption Technology based on Chaos and Neural Network
International Core Journal of Engineering
收藏 引用
International Core Journal of Engineering 2021年 第10期7卷 196-201页
作者: Mindan Zhang Ye Tao Wenyu Zhang
Artificial neural network is a very important operation model in the field of artificial intelligence. Ann deals with complex problems by simulating the structure and logic of human brain. Chaotic system is a dynamic ... 详细信息
来源: 评论
Cryptanalysis and Improvement in a Plaintext-Related Image encryption Scheme Based on Hyper Chaos
收藏 引用
IEEE ACCESS 2019年 7卷 126450-126463页
作者: Liu, Lidong Zhang, Zhaolun Chen, Ruijie Changan Univ Sch Informat Engn Xian 710064 Shaanxi Peoples R China Xidian Univ Sch Commun Engn Xian 710071 Shaanxi Peoples R China
Recently, a plaintext-related image encryption scheme based on a hyper-chaotic system has been proposed by Li et al. In their encryption scheme, the permutation process is related to the sum of plaintext pixel values,... 详细信息
来源: 评论
KEY HANDLING WITH CONTROL VECTORS (REPRINTED FROM JOURNAL OF CRYPTOLOGY, VOL 3, NO 2, 1990)
收藏 引用
IBM SYSTEMS JOURNAL 1991年 第2期30卷 151-174页
作者: MATYAS, SM IBM CORP KINGSTON DEV LABCRYPTOG CTR COMPETENCEKINGSTONNY 12401
A method is presented for controlling cryptographic key usage based on control vectors. Each cryptographic key has an associated control vector that defines the permitted uses of the key within the cryptographic syste... 详细信息
来源: 评论
Secure fuzzy recognition and its general problems
Secure fuzzy recognition and its general problems
收藏 引用
3rd International Symposium on Safety Science and Technology (2002 ISSST)
作者: Li, Y Shi, KQ Hu, HQ Shandong Univ Sch Math & Syst Sci Jinan 250100 Peoples R China
The paper is a term of research in which fuzzy recognition theory, information encryption theory and encryption technique are mutually engrafted. encryption of fuzzy recognition and its general concept are introduced ... 详细信息
来源: 评论