咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 102 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 279 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 235 篇 工学
    • 151 篇 计算机科学与技术...
    • 80 篇 电气工程
    • 53 篇 信息与通信工程
    • 24 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 16 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 30 篇 理学
    • 16 篇 数学
    • 13 篇 物理学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
    • 2 篇 工商管理
  • 13 篇 医学
    • 8 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 279 篇 encryption algor...
  • 71 篇 cryptography
  • 28 篇 encryption
  • 22 篇 security
  • 15 篇 data security
  • 15 篇 images
  • 14 篇 blockchain
  • 13 篇 imagery (psychot...
  • 13 篇 chaos
  • 12 篇 image
  • 11 篇 image encryption
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 9 篇 decryption
  • 8 篇 internet of thin...
  • 8 篇 privacy protecti...
  • 8 篇 authentication
  • 8 篇 cloud computing
  • 7 篇 chaotic systems

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 bandung inst tec...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...
  • 1 篇 dept. of compute...
  • 1 篇 nmu fac artiller...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 li haifeng
  • 2 篇 li jinqing
  • 2 篇 nan zhang
  • 2 篇 li ju
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 di xiaoqiang
  • 2 篇 hu guoliang
  • 2 篇 xiaoqiang zhang
  • 2 篇 susilo willy

语言

  • 269 篇 英文
  • 7 篇 其他
  • 3 篇 中文
检索条件"主题词=Encryption algorithm"
279 条 记 录,以下是241-250 订阅
排序:
Blockchain data privacy protection modeling based on CP-ABE algorithm
收藏 引用
INTERNATIONAL JOURNAL OF EMERGING ELECTRIC POWER SYSTEMS 2023年 第5期24卷 681-691页
作者: Dang, Qian Qiu, Yu Sun, Biying Yang, Zhengwei Liu, Xinrui State Grid Gansu Elect Power Co Internet Div Lanzhou 730050 Gansu Peoples R China
With the proposal of the concept of ubiquitous power Internet of Things and the further promotion of blockchain strategy, modern information technologies such as the Internet of Things and cloud computing have been wi... 详细信息
来源: 评论
How to encrypt a graph
收藏 引用
INTERNATIONAL JOURNAL OF PARALLEL EMERGENT AND DISTRIBUTED SYSTEMS 2020年 第6期35卷 668-681页
作者: Akl, Selim G. Queens Univ Sch Comp Kingston ON K7L 3N6 Canada
An algorithm is described for encrypting a graph to be transmitted securely from a sender to a receiver. In communications terminology, "the graph is the message": its vertices, its edges, and its edge weigh... 详细信息
来源: 评论
Research on digital forensics method of 5G communication system in the future based on direct intermediate frequency sampling
收藏 引用
INTERNATIONAL JOURNAL OF AUTONOMOUS AND ADAPTIVE COMMUNICATIONS SYSTEMS 2022年 第1期15卷 46-62页
作者: Luo, Xian Liao, Rongtao Hu, Huanjun Ye, Yuxuan Informat & Commun Branch Hubei EPC Wuhan 430074 Peoples R China
To overcome the problems of low efficiency and poor security in the process of digital forensics, a digital forensics method based on direct if sampling for 5G communication system is proposed. In this method, the mod... 详细信息
来源: 评论
Investigation and application of key technologies of aggregated flash payment based on marketing blockchain in the context of massive distributed generation grid connection
收藏 引用
INTERNATIONAL JOURNAL OF EMERGING ELECTRIC POWER SYSTEMS 2023年 第4期24卷 465-474页
作者: Wang, Chao Zhang, Qingfang Yang, Pengfei Si, Xiaofeng Zhou, Li State Grid Gansu Elect Power Co Lanzhou 730000 Gansu Peoples R China State Grid Gansu Elect Power Co Mkt Serv Ctr Lanzhou 730000 Gansu Peoples R China
Optical flash payment technology is a form of optical flash payment application. Its payment scenario is mainly to directly realize "card free payment" in the consumption process through mobile devices, Blue... 详细信息
来源: 评论
Extensive Medical Data Storage With Prominent Symmetric algorithms On Cloud - A Protected Framework
Extensive Medical Data Storage With Prominent Symmetric Algo...
收藏 引用
IEEE International Conference on Smart Structures and Systems
作者: G. Nalinipriya R. Aswiri Kumar Associate Professor Saveetha Engineering College Chennai India. PG Scholar Saveetha Engineering College Chennai India.
The cloud is an emerging field in the IT. It is a way of delivering IT-enabled services in the form of software, platform and infrastructure. Cloud computing in recent times has become a trend among all walks of life ... 详细信息
来源: 评论
Efficient Secure Outsourcing Computation of Matrix Multiplication in Cloud Computing
Efficient Secure Outsourcing Computation of Matrix Multiplic...
收藏 引用
IEEE Global Communications Conference
作者: Shenmin Zhang Hongwei Li Kun Jia Yunshun Dai Lian Zhao Sch. of Comput. Sci. & Eng. Univ. of Electron. Sci. & Technol. of China Chengdu China Dept. of Electr. & Comput. Engineeirng Ryerson Univ. Toronto ON Canada
With development of outsourcing computation, it is possible for clients with limited computing resources to outsource heavy computational tasks to the cloud server and thus relieve huge burden of the client. As contin... 详细信息
来源: 评论
A Smaller and Faster Variant of RSM  14
A Smaller and Faster Variant of RSM
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Noritaka Yamashita Kazuhiko Minematsu Toshihiko Okamura Yukiyasu Tsunoo NEC Corporation Nakahara-Ku Kawasaki Kanagawa Japan
Masking is one of the major countermeasures against side-channel attacks to cryptographic modules. Nassar et al. recently proposed a highly efficient masking method, called Rotating S-boxes Masking (RSM), which can be... 详细信息
来源: 评论
Electronic aircraft maintenance record signature technology based on SM2 cryptographic algorithm
Electronic aircraft maintenance record signature technology ...
收藏 引用
IEEE International Conference on Civil Aviation Safety and Information Technology (ICCASIT)
作者: Rui Liu Yingzhi Zou Xinfeng Chen Haitao Yang Division of Maintenance Engineering China Academy of Civil Aviation Science and Technology Beijing China China Academy of Civil Aviation Science and Technology Law Regulation and Standardization Institute Beijing China
The paperlessness of maintenance records is an inevitable trend in the development of civil aviation informationization. This paper proposes a method for the use of reliable electronic signatures for electronic record... 详细信息
来源: 评论
Analyzing Energy and Time Overhead of Security Mechanisms in Wireless Sensor Networks
Analyzing Energy and Time Overhead of Security Mechanisms in...
收藏 引用
International Conference on Systems, Signals and Image Processing
作者: P. Trakadas T. Zahariadis H. C. Leligou S. Voliotis K. Papadopoulos Dept. of Electrical Engineering TEI of Chalkis Psahna Chalkis Greece
The primary requirements of a successful Wireless Sensor Network security architecture are confidentiality, integrity and authentication. Most of these security objectives can be addressed using appropriate hash funct... 详细信息
来源: 评论
A New Method to Solve B/S Structure of Network Information Security
A New Method to Solve B/S Structure of Network Information S...
收藏 引用
2nd International Conference on Communication Technology(ICCT 2015)
作者: Jianning Yang Jiankun Yang Kun Lin Yunnan Normal University Business School Wuhua District Yunnan Normal University Business School Network Center Kunming branch of China Telecom Co.Ltd Dehong Vocational College
This paper introduces a new method to solve B/S structure of network information security, namely uses the session ID as the key to achieve encryption transmission and identity of fake sensitive information in the net... 详细信息
来源: 评论