咨询与建议

限定检索结果

文献类型

  • 175 篇 会议
  • 118 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 296 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 249 篇 工学
    • 158 篇 计算机科学与技术...
    • 85 篇 电气工程
    • 56 篇 信息与通信工程
    • 27 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 37 篇 理学
    • 19 篇 物理学
    • 17 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 296 篇 encryption algor...
  • 81 篇 cryptography
  • 27 篇 encryption
  • 24 篇 security
  • 17 篇 images
  • 16 篇 image
  • 15 篇 data security
  • 15 篇 imagery (psychot...
  • 14 篇 blockchain
  • 12 篇 decryption
  • 12 篇 chaos
  • 11 篇 image encryption
  • 10 篇 algorithms
  • 10 篇 security level
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 8 篇 internet of thin...
  • 8 篇 privacy protecti...

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang
  • 2 篇 xiaoqiang zhang

语言

  • 280 篇 英文
  • 13 篇 其他
  • 3 篇 中文
检索条件"主题词=Encryption algorithm"
296 条 记 录,以下是171-180 订阅
RSA and Elliptic Curve encryption System: A Systematic Literature Review
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY 2024年 第1期18卷 1页
作者: Ugbedeojo, Musa Adebiyi, Marion O. Aroba, Oluwasegun Julius Adebiyi, Ayodele Ariyo Landmark Univ Omu Aran Nigeria Durban Univ Technol Durban South Africa
Almost every living species has a motive to communicate electronically with one another and preserve data for immediate or future use. These data are becoming too large to be maintained on personal storage devices. Te... 详细信息
来源: 评论
Online Shopping System Based on Improved MD5  1
收藏 引用
3rd International Conference on Information Computing and Applications (ICICA 2012)
作者: Li, Ji-Rui Zhang, Su-Qing Henan Vocat & Tech Inst Informat Engineer Dept Zhengzhou Peoples R China
Message-Digest algorithm 5, a hash function which is widely used in the field of computer security, can provide the message integrity protection. But to the field following certain rules, for example, by date of birth... 详细信息
来源: 评论
Contriving Hybrid DESCAST algorithm for Cloud Security  11
Contriving Hybrid DESCAST Algorithm for Cloud Security
收藏 引用
11th International Conference on Communication Networks (ICCN)
作者: Sengupta, Nandita Chinnasamy, Ramya Univ Coll Bahrain Dept Informat Technol Manama Bahrain
Cloud computing has taken a major part in IT industry both for an individual and the organization. Primarily, it's used as infrastructure as a service, platform as a service, file storage, disaster recovery and ba... 详细信息
来源: 评论
Cryptography in Quantum Computing  4th
Cryptography in Quantum Computing
收藏 引用
Future Technologies Conference (FTC)
作者: Choy, Pam Cates, Dustin Chehwan, Florent Rodriguez, Cindy Leider, Avery Tappert, Charles C. Pace Univ Seidenberg Sch Comp Sci & Informat Syst Pleasantville NY 10570 USA
Quantum cryptography is an area of intense interest, as quantum computers contain the potential to break many classical encryption algorithms. With so much on the line, it is imperative to find a new quantum encryptio... 详细信息
来源: 评论
Side-Channel Leakage Models for RISC Instruction Set Architectures from Empirical Data  18
Side-Channel Leakage Models for RISC Instruction Set Archite...
收藏 引用
18th Euromicro Conference on Digital System Design (DSD)
作者: Seuschek, Hermann Rass, Stefan Tech Univ Munich Inst Secur Informat Technol D-80290 Munich Germany Alpen Adria Univ Klagenfurt Inst Appl Informat Klagenfurt Austria
Side-channel attacks are currently among the most serious threats for embedded systems. Popular countermeasures to mitigate the impact of such attacks are masking schemes, where secret intermediate values are split in... 详细信息
来源: 评论
Experimental validation of IoT image encryption scheme based on a 5-D fractional hyperchaotic system and Numba JIT compiler
收藏 引用
INTERNET OF THINGS 2024年 25卷
作者: Clemente-Lopez, Daniel Munoz-Pacheco, Jesus M. Rangel-Magdaleno, Jose de Jesus Inst Nacl Astrofis Opt & Elect INAOE Dept Elect Luis Enrique Erro 1 Tonantzintla 72840 Puebla Mexico Benemerita Univ Autonoma Puebla Fac Elect Sci Ave San Claudio & 18 Sur Puebla 72570 Puebla Mexico
In the realm of Internet of Things (IoT) systems, the interconnectivity of physical hardware devices is a fundamental aspect, and as a result, data exchange assumes a critical role in the network. Given the sensitivit... 详细信息
来源: 评论
Online Shopping Information encryption based on Hierarchical encryption Model
International Core Journal of Engineering
收藏 引用
International Core Journal of Engineering 2023年 第4期9卷 251-256页
作者: Chuanqi Ma
With the continuous development of information technology, online shopping has become a preferred way of shopping by its convenience and rapidity. However, online shopping also brings some hidden dangers to consumers ... 详细信息
来源: 评论
Analysis of Path ORAM toward Practical Utilization  18
Analysis of Path ORAM toward Practical Utilization
收藏 引用
18th International Conference on Network-Based Information Systems (NBiS)
作者: Gordon, Steven Miyaji, Atsuko Su, Chunhua Sumongkayyothin, Karin Japan Adv Inst Sci & Technol Nomi Ishikawa Japan Japan Sci & Technol Agcy JST CREST Kawaguchi Saitama Japan Thammasat Univ Sirindhorn Int Inst Technol Bangkok Thailand
Oblivious RAM is known as a secure protocol for hiding client's access pattern from an untrusted server. However, the current ORAM algorithms still incur large computation, storage and communication overheads. For... 详细信息
来源: 评论
Cryptoraptor: High Throughput Reconfigurable Cryptographic Processor  33
Cryptoraptor: High Throughput Reconfigurable Cryptographic P...
收藏 引用
33rd IEEE/ACM International Conference on Computer-Aided Design (ICCAD)
作者: Sayilar, Gokhan Chiou, Derek Univ Texas Austin Austin TX 78712 USA Microsoft Redmond WA USA
This paper describes a high performance, low power, and highly flexible cryptographic processor, Cryptoraptor, which is designed to support both today's and tomorrow's symmetric-key cryptography algorithms and... 详细信息
来源: 评论
Chaotic Generator Synthesis: Dynamical and Statistical Analysis
Chaotic Generator Synthesis: Dynamical and Statistical Analy...
收藏 引用
7th International Conference for Internet Technology and Secured Transactions (ICITST)
作者: Taralova, Ina Lozi, Rene El Assad, Safwan Ecole Cent Nantes IRCCyN 1 Rue Noe F-44321 Nantes France Univ Nice Sophia Antipolis Laboratoire J Dieudonne CNRS UMR 7351 F-F06046 Nice France Polytech Nantes IETR CNRS UMR 6164 F-44306 Nantes France
The paper presents a novel chaotic encryption algorithm which can be used to improve the communication security. An uncomplicated process of chaotic substitution permutation network (SPN) with variable control paramet... 详细信息
来源: 评论