咨询与建议

限定检索结果

文献类型

  • 175 篇 会议
  • 118 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 296 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 249 篇 工学
    • 158 篇 计算机科学与技术...
    • 85 篇 电气工程
    • 56 篇 信息与通信工程
    • 27 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 37 篇 理学
    • 19 篇 物理学
    • 17 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 296 篇 encryption algor...
  • 81 篇 cryptography
  • 27 篇 encryption
  • 24 篇 security
  • 17 篇 images
  • 16 篇 image
  • 15 篇 data security
  • 15 篇 imagery (psychot...
  • 14 篇 blockchain
  • 12 篇 decryption
  • 12 篇 chaos
  • 11 篇 image encryption
  • 10 篇 algorithms
  • 10 篇 security level
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 8 篇 internet of thin...
  • 8 篇 privacy protecti...

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang
  • 2 篇 xiaoqiang zhang

语言

  • 280 篇 英文
  • 13 篇 其他
  • 3 篇 中文
检索条件"主题词=Encryption algorithm"
296 条 记 录,以下是191-200 订阅
排序:
Fast Implementation and Cryptanalysis of GOST R 34.12-2015 Block Ciphers  16
Fast Implementation and Cryptanalysis of GOST R 34.12-2015 B...
收藏 引用
9th International Conference on Security of Information and Networks (SIN)
作者: Ishchukova, Evgeniya Babenko, Ludmila Anikeev, Maxim Southern Fed Univ Chekhova 2 Taganrog 347928 Russia
The new cryptographic standard GOST R 34.12-2015 "Information technology. Cryptographic Data Security. Block ciphers." [7] came into force on January 1st, 2016. The standard contains two encryption algorithm... 详细信息
来源: 评论
P-adic Shrinking-Multiplexing Generator
P-adic Shrinking-Multiplexing Generator
收藏 引用
3rd IEEE Intelligent Data Acquisition and Advanced Computing Systems
作者: Tasheva, Zhaneta Bedzhev, Borislav Stoyanov, Borislav NMU Fac Artillery & Air Defense Shumen Bulgaria
The need for stream ciphers in communication and information cryptographic systems is rapidly grown in the last twenty years. The stream ciphers usually use a pseudo-random number generator with large period, large li... 详细信息
来源: 评论
A new security architecture for mobile communication
A new security architecture for mobile communication
收藏 引用
17th IASTED International Conference on Modelling and Simulation
作者: Chen Tianzhou Huang Yu Chen Feng Hu Wei Zhejiang Univ Dept Comp Sci Hangzhou 310000 Peoples R China Zhejiang Univ Dept Publ Secur Hangzhou 310000 Peoples R China
There are many security defects in existing mobile communication systems, such as unidirectional authentication and cipher key transmission in plaintext. With the expansion of the mobile communication services, the mo... 详细信息
来源: 评论
A Method of Data Distribution and Traceability Based on Blockchain  8th
A Method of Data Distribution and Traceability Based on Bloc...
收藏 引用
8th International Conference on Artificial Intelligence and Security (ICAIS)
作者: Gu, Bin Zou, Yunfeng Cai, Dongyang Fan, Huanyu State Grid Jiangsu Elect Power Co Ltd Nanjing 210000 Jiangsu Peoples R China State Grid Jiangsu Mkt Serv Ctr Metrol Ctr Nanjing 210000 Jiangsu Peoples R China
In view of the privacy and particularity of power data, this paper proposes a traceability encryption data distribution method based on encryption technology in power system, including data distribution based on encry... 详细信息
来源: 评论
Extending Residue-based Fault Tolerance to Encrypted Computation  46
Extending Residue-based Fault Tolerance to Encrypted Computa...
收藏 引用
46th IEEE International Test Conference (ITC)
作者: Tsoutsos, Nektarios Georgios Maniatakos, Michail NYU Sch Engn Comp Sci & Engn New York NY 10003 USA New York Univ Abu Dhabi Elect & Comp Engn Abu Dhabi U Arab Emirates
In this work we adapt residue numbering and modular arithmetic, combining them with the intrinsic properties of partial homomorphic encryption algorithms, in order to propose an efficient fault tolerance framework spe... 详细信息
来源: 评论
Public algorithm in Reversible Data Hiding  27
Public Algorithm in Reversible Data Hiding
收藏 引用
27th Iranian Conference on Electrical Engineering (ICEE)
作者: Mohammadi, Ammar Nakhkash, Mansour Yazd Univ Dept Elect Engn Yazd Iran
Reversible data hiding (RDH) schemes provide some capacities in the host image to embed message so that message and the host image can respectively be extracted and restored at the destination with no distortion. This... 详细信息
来源: 评论
A Performance Analysis Model for Cryptographic Protocols  2
A Performance Analysis Model for Cryptographic Protocols
收藏 引用
2nd International Conference on Society and Information Technologies (ICSIT 2011)
作者: Olagunju, Amos Soenneker, Jake St Cloud State Univ Comp Networking & Applicat Program St Cloud MN 56301 USA
Several encryption algorithms exist today for securing data in storage and transmission over network systems. The choice of encryption algorithms must weigh performance requirements against the call for protection of ... 详细信息
来源: 评论
Secure Data Hiding in PDF Files Using an Encrypted Secret Message
Secure Data Hiding in PDF Files Using an Encrypted Secret Me...
收藏 引用
Advanced Research Workshop (ARW) on Meeting Security Challenges through Data Analytics and Decision Support
作者: Arshakyan, Anahit Natl Polytech Univ Armenia Informat Secur & Software Dev Dept Yerevan Armenia
A desktop application providing steganographic data hiding is proposed. The steganographic key secure exchange is realized through the Diffie-Hellman key exchange protocol, and Portable Document Format files are used ... 详细信息
来源: 评论
Improved Design of GPRS Wireless Security System Based on AES
收藏 引用
International Conference on Advances in Computer Science, Environment, Ecoinformatics, and Education
作者: Ma, TaoLin Sun, XiaoLan Zhang, LiangPei Whuhan Univ Sch Printing & Packaging Wuhan 430079 Peoples R China Whuhan Univ State Key Lab for Informat Engn Surveying Mapping & Remote Sensing Wuhan 430079 Peoples R China
This paper mainly studied how to improve security system by analyzing the current situation and defects of existing encryption security systems. Based on existing studies, optimized GPRS wireless security system (GPRS... 详细信息
来源: 评论
Implementation of "Magma" and "Kuznyechik" ciphers using HIP  6
Implementation of "Magma" and "Kuznyechik" ciphers using HIP
收藏 引用
6th International Conference on Information Technology and Nanotechnology (IEEE ITNT)
作者: Borisov, Alexey Myasnikov, Evgeny Samara Natl Res Univ Dept Geoinformat & Informat Secur Samara Russia
In this paper, we present an implementation of Russian cryptographic standards using HIP, an open-source technology that allows writing a C++ code, which can be compiled for AMD and NVIDIA GPUs. The details of effecti... 详细信息
来源: 评论