咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 120 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 297 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 248 篇 工学
    • 157 篇 计算机科学与技术...
    • 84 篇 电气工程
    • 55 篇 信息与通信工程
    • 27 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 36 篇 理学
    • 19 篇 物理学
    • 16 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 297 篇 encryption algor...
  • 81 篇 cryptography
  • 27 篇 encryption
  • 24 篇 security
  • 17 篇 images
  • 16 篇 image
  • 15 篇 data security
  • 15 篇 imagery (psychot...
  • 14 篇 blockchain
  • 12 篇 decryption
  • 12 篇 chaos
  • 11 篇 image encryption
  • 10 篇 algorithms
  • 10 篇 security level
  • 9 篇 privacy protecti...
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 8 篇 internet of thin...

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang
  • 2 篇 xiaoqiang zhang

语言

  • 282 篇 英文
  • 12 篇 其他
  • 3 篇 中文
检索条件"主题词=Encryption algorithm"
297 条 记 录,以下是221-230 订阅
排序:
encryption Techniques for Cloud Data Confidentiality
收藏 引用
INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING 2014年 第4期7卷 11-20页
作者: Soofi, Aized Amin Khan, M. Irfan Fazal-e-Amin Govt Coll Univ Coll Comp Sci & Informat Studies Faisalabad Pakistan King Saud Univ Coll Comp & Informat Sci Riyadh Saudi Arabia
Cloud computing is one of the fastest growing internet based technology that facilitates users to utilize services by making use of large poll of resources without installation of any software. Adoption of this techno... 详细信息
来源: 评论
Accelerating Leveled Fully Homomorphic encryption Using GPU
Accelerating Leveled Fully Homomorphic Encryption Using GPU
收藏 引用
IEEE International Symposium on Circuits and Systems
作者: Wei Wang Zhilu Chen Xinming Huang Department of Electrial and Computer Engineering Worcester Polytechnic Institute MA 01609USA
Gentry introduced the first plausible fully homomorphic encryption (FHE) scheme, which was considered a major breakthrough in cryptography. Several FHE schemes have been proposed to make FHE more efficient for practic... 详细信息
来源: 评论
Pluggable encryption algorithm In Secure Shell(SSH) Protocol
Pluggable Encryption Algorithm In Secure Shell(SSH) Protocol
收藏 引用
2nd International Conference on Emerging Trends in Engineering and Technology (ICETET09)
作者: Iyappan, P. Arvind, K. S. Geetha, N. Vanitha, S. Rajiv Gandhi Coll Engg & Technol Pondicherry India Dr Pauls Coll Engn Pondicherry India
System security is a crucial constraint for Secure Transfer of data. Because of the nature of the SSH Protocol, anyone with access to the central server can manipulate files, it is imperative that only authorized user... 详细信息
来源: 评论
Use of elliptic curve cryptography for multimedia encryption
收藏 引用
IET INFORMATION SECURITY 2013年 第2期7卷 67-74页
作者: Tawalbeh, Lo'ai Mowafi, Moad Aljoby, Walid Jordan Univ Sci & Technol Dept Comp Engn Cryptog Hardware & Informat Secur CHiS Lab Irbid Jordan Jordan Univ Sci & Technol Dept Network Engn & Secur Irbid Jordan
The unique characteristics of the elliptic curve cryptography (ECC) such as the small key size, fast computations and bandwidth saving make its use attractive for multimedia encryption. In this study, the ECC is used ... 详细信息
来源: 评论
Efficient Privacy of Message encryption algorithm for Anonymous Receivers in E-commerce
Efficient Privacy of Message Encryption Algorithm for Anonym...
收藏 引用
2nd International Conference on Biomedical Engineering and Informatics (BMEI)
作者: Xu Xiang-yang Changsha Univ Dept Comp Sci & Technol Country Changsha Peoples R China
Protecting the privacy of message receivers is an important issue in pay services of e-commerce and the distribution of digital contents on the Internet. This paper proposes an efficient privacy of message encryption ... 详细信息
来源: 评论
A Study of DES and Blowfish encryption algorithm
A Study of DES and Blowfish Encryption Algorithm
收藏 引用
IEEE Region 10 Conference 2009
作者: Nie, Tingyuan Zhang, Teng Qingdao Technol Univ Commun & Elect Engn Inst Qingdao Peoples R China
With the rapid growing of internet and networks applications, data security becomes more important than ever before. encryption algorithms play a crucial role in information security systems. In this paper, we have a ... 详细信息
来源: 评论
The security analysis of PhpBB forum
The security analysis of PhpBB forum
收藏 引用
International Conference on Cyberspace Technology (CCT 2014)
作者: Lijun Zhang Jia Fan Science and Technology on Communication Security Laboratory ChengDu China
PhpBB forum is one of the widely applied network forums. In this paper, we investigate the security of this kind of forum. We analyze the whole process of security mechanism related to user's password, including p... 详细信息
来源: 评论
A Smaller and Faster Variant of RSM  14
A Smaller and Faster Variant of RSM
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Noritaka Yamashita Kazuhiko Minematsu Toshihiko Okamura Yukiyasu Tsunoo NEC Corporation Nakahara-Ku Kawasaki Kanagawa Japan
Masking is one of the major countermeasures against side-channel attacks to cryptographic modules. Nassar et al. recently proposed a highly efficient masking method, called Rotating S-boxes Masking (RSM), which can be... 详细信息
来源: 评论
Digital encrypt watermarking based on wavelet transform
Digital encrypt watermarking based on wavelet transform
收藏 引用
ICINS 2014 - 2014 International Conference on Information and Network Security
作者: Shibing Zhang Yanan Wu School of Electrical and Information Nantong University China
Watermarking encryption is an effective technique in the copyright protection of digital media. This paper focuses on the watermarking encryption and proposes a digital watermarking encryption algorithm which is based... 详细信息
来源: 评论
PWLCM Based Image encryption Through Compressive Sensing
PWLCM Based Image Encryption Through Compressive Sensing
收藏 引用
IEEE Recent Advances in Intelligent Computational Systems (RAICS)
作者: Abhishek George, Sudhish N. Deepthi, P. P. Natl Inst Technol Dept Elect & Commun Engn Calicut 673601 Kerala India
In this paper, compressive sensing is combined with a chaotic key based generation of measurement matrix to provide an effective encryption algorithm for multimedia security. Block-based compressive sensing provides a... 详细信息
来源: 评论