咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 106 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 281 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 237 篇 工学
    • 152 篇 计算机科学与技术...
    • 81 篇 电气工程
    • 53 篇 信息与通信工程
    • 25 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 17 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 30 篇 理学
    • 16 篇 数学
    • 13 篇 物理学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
    • 2 篇 工商管理
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 281 篇 encryption algor...
  • 71 篇 cryptography
  • 28 篇 encryption
  • 22 篇 security
  • 15 篇 images
  • 14 篇 data security
  • 14 篇 blockchain
  • 13 篇 imagery (psychot...
  • 12 篇 image
  • 12 篇 chaos
  • 11 篇 image encryption
  • 9 篇 privacy protecti...
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 decryption
  • 8 篇 internet of thin...
  • 8 篇 authentication
  • 8 篇 aes
  • 8 篇 cloud computing
  • 7 篇 chaotic systems

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 bandung inst tec...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...
  • 1 篇 dept. of compute...
  • 1 篇 nmu fac artiller...
  • 1 篇 department of co...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li ju
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang
  • 2 篇 xiaoqiang zhang
  • 2 篇 susilo willy
  • 2 篇 matalgah mustafa...
  • 2 篇 yicong zhou

语言

  • 269 篇 英文
  • 8 篇 其他
  • 3 篇 中文
检索条件"主题词=Encryption algorithm"
281 条 记 录,以下是251-260 订阅
排序:
Image encryption Research based on chaotic sequences and wavelet transform
Image Encryption Research based on chaotic sequences and wav...
收藏 引用
2010 International Conference on Audio,Language and Image Processing(2010年音频、语言与图像处理国际会议 ICALIP 2010)
作者: Runhe Qiu Yuzhe Fu Yun Cao Institute of Information Science and Technology Donghua University Shanghai China
Using the characteristics of the chaotic system, such as ergodicity, sensitivity to initial condition, system parameters and random like behavior, this paper proposes a new image encryption algorithm based on chaotic ... 详细信息
来源: 评论
Study on Strategy of Account Security Based on SQL Server Database
Study on Strategy of Account Security Based on SQL Server Da...
收藏 引用
1st International Conference on E-Business and Information System Security
作者: Zhang, Hong-yan Wang, Wei Henan Inst Engn Dept Comp Zhengzhou Peoples R China
As the aggregation of information, database system is the core part of computer information system. The security of the database system is of great importance, as the important resource of the website, the security of... 详细信息
来源: 评论
A Scheme of E-Commerce Security based on ECC & SSL, Protocol
A Scheme of E-Commerce Security based on ECC & SSL, Protocol
收藏 引用
1st International Symposium on Computer Network and Multimedia Technology
作者: Ren, Zhikao Liu, Minghua Ye, Chen Wang, Chuansheng Qingdao Univ Sci & Technol Coll Informat Qingdao Peoples R China Qingdao Univ Sci & Technol Coll Elect Engn Qingdao Peoples R China
Considering the inefficiency of using traditional RSA algorithm in SSL protocol at E-Business area, a new E-commerce security scheme which the ECC is embed into SSL Protocol has been put forward, and the test has been... 详细信息
来源: 评论
Image encryption Based on Chaos with PWL Memristor in Chua’s Circuit
Image Encryption Based on Chaos with PWL Memristor in Chua’...
收藏 引用
2009国际通信电路与系统学术会议(ICCCAS 2009)(2009 International Conference on Communications,Circuits and Systems)
作者: Zhao-hui Lin Hong-xia Wang School of Information Science and Technology Southwest Jiaotong University Chengdu 610031 P.R.China
Image encryption algorithm based on chaotic system has been increasingly, but the disadvantages of small key space, weak security in low dimensional chaotic cryptosystems, simple chaotic system, and inconvenient for h... 详细信息
来源: 评论
IC-Card Reader Antenna and IC-Card Technology's Analysis by Wireless Communications
IC-Card Reader Antenna and IC-Card Technology's Analysis by ...
收藏 引用
European Conference on Antennas and Propagation
作者: Donghun Yoon Keio University of Japan
This paper describes wireless communications study for IC-Card Reader Antenna and IC-Card technology. IC-Card is plastic card with embedded micro circuit. It is embedded induction coil and condenser. IC-Card is a pass... 详细信息
来源: 评论
SLDRM: A Self Local License Digital Rights Management System
SLDRM: A Self Local License Digital Rights Management System
收藏 引用
2nd IEEE International Conference on Digital Ecosystems and Technologies
作者: Sharifi, Mohsen Lajevardi, Behzad Gholami, Omid Iran Univ Sci & Technol Dept Comp Engn Tehran Iran
Digital Rights Management (DRM) systems try to protect copyrights and digital contents by limiting access by users to contents. They provide facilities for electronic publishers to distribute their precious contents t... 详细信息
来源: 评论
A Generic Construction of Identity-Based Online/Offline Signcryption
A Generic Construction of Identity-Based Online/Offline Sign...
收藏 引用
IEEE International Symposium on Parallel and Distributed Processing with Applications
作者: Sun, Dongdong Mu, Yi Susilo, Willy Univ Wollongong Sch Comp Sci & Software Engn Wollongong NSW 2522 Australia
Signcryption has clear advantage over traditional sign-then-encrypt schemes. However, the computational overhead for signcryption is still too heavy when it is applied to resource-constraint systems. In this paper, we... 详细信息
来源: 评论
Analyzing Energy and Time Overhead of Security Mechanisms in Wireless Sensor Networks
Analyzing Energy and Time Overhead of Security Mechanisms in...
收藏 引用
International Conference on Systems, Signals and Image Processing
作者: P. Trakadas T. Zahariadis H. C. Leligou S. Voliotis K. Papadopoulos Dept. of Electrical Engineering TEI of Chalkis Psahna Chalkis Greece
The primary requirements of a successful Wireless Sensor Network security architecture are confidentiality, integrity and authentication. Most of these security objectives can be addressed using appropriate hash funct... 详细信息
来源: 评论
Image information hiding encryption using chaotic sequence
Image information hiding encryption using chaotic sequence
收藏 引用
11th International Conference on Knowledge-Based Intelligent Informational and Engineering Systems/17th Italian Workshop on Neural Networks
作者: Liu, Zhen Xi, Lifeng Zhejiang Wanli Univ Sch Comp Sci & Informat Technol Ningbo 315100 Zhejiang Peoples R China
In this paper, we propose a new image watermark algorithm of information hiding scheme based on chaotic encryption. Chaotic sequence is regarded as a noise-like spread sequence, and the secret signal to be transmitted... 详细信息
来源: 评论
Discussion of one new symmetric algorithm
Discussion of one new symmetric algorithm
收藏 引用
International Multiconference of Engineers and Computer Scientists
作者: Chan, Xiaorui Liu, Guangzhong Shanghai Maritime Univ Coll Informat Engn Shanghai Peoples R China
We have devised one now kind of 160 bits symmetric encryption algorithms, basing on a kernel encryption function called S. By incising 160 bits data block into eight pieces, S function produces one brand-new 160 bits ... 详细信息
来源: 评论