咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 106 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 281 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 237 篇 工学
    • 152 篇 计算机科学与技术...
    • 81 篇 电气工程
    • 53 篇 信息与通信工程
    • 25 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 17 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 30 篇 理学
    • 16 篇 数学
    • 13 篇 物理学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
    • 2 篇 工商管理
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 281 篇 encryption algor...
  • 71 篇 cryptography
  • 28 篇 encryption
  • 22 篇 security
  • 15 篇 images
  • 14 篇 data security
  • 14 篇 blockchain
  • 13 篇 imagery (psychot...
  • 12 篇 image
  • 12 篇 chaos
  • 11 篇 image encryption
  • 9 篇 privacy protecti...
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 decryption
  • 8 篇 internet of thin...
  • 8 篇 authentication
  • 8 篇 aes
  • 8 篇 cloud computing
  • 7 篇 chaotic systems

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 bandung inst tec...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...
  • 1 篇 dept. of compute...
  • 1 篇 nmu fac artiller...
  • 1 篇 department of co...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li ju
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang
  • 2 篇 xiaoqiang zhang
  • 2 篇 susilo willy
  • 2 篇 matalgah mustafa...
  • 2 篇 yicong zhou

语言

  • 269 篇 英文
  • 8 篇 其他
  • 3 篇 中文
检索条件"主题词=Encryption algorithm"
281 条 记 录,以下是261-270 订阅
排序:
Efficient RFID authentication protocol for minimizing RFID tag computation
Efficient RFID authentication protocol for minimizing RFID t...
收藏 引用
1st International Conference on Hybrid Information Technology
作者: Rhee, Keunwoo Kwak, Jin Yi, Wan S. Park, Chanho Park, Sangjoon Yang, Hyungkyu Kim, Seungjoo Won, Dongho Sungkyunkwan Univ Informat Secur Grp 300 Cheoncheon Dong Suwon 440746 Gyeonggi Do South Korea Soonchunhyang Univ Dept Informat Secur Asan 336745 South Korea INDI SYST Co Ltd Seoul 152848 South Korea Kangnam Univ Dept Comp & Media Engn Giheung 446702 South Korea
RFID systems have become vital technology for realizing ubiquitous computing environments. However, features of RFID systems present potential security and privacy problems. In an effort to resolve these problems, man... 详细信息
来源: 评论
A new security architecture for mobile communication
A new security architecture for mobile communication
收藏 引用
17th IASTED International Conference on Modelling and Simulation
作者: Chen Tianzhou Huang Yu Chen Feng Hu Wei Zhejiang Univ Dept Comp Sci Hangzhou 310000 Peoples R China Zhejiang Univ Dept Publ Secur Hangzhou 310000 Peoples R China
There are many security defects in existing mobile communication systems, such as unidirectional authentication and cipher key transmission in plaintext. With the expansion of the mobile communication services, the mo... 详细信息
来源: 评论
A NEW DIRECTION OF BLOCK CIPHER AND ITS CRYPTANALYSIS
A NEW DIRECTION OF BLOCK CIPHER AND ITS CRYPTANALYSIS
收藏 引用
2006北京地区高校研究生学术交流会
作者: 王利琴 武金木 刘依 张邑博 河北工业大学计算机科学与软件学院 河北工业大学计算机科学与软件学院 河北工业大学计算机科学与软件学院 河北省人事考试中心
Gives two principles that block cipher needs for research after the introduction of cryptography, and supplies a new concept of encryption - permutation code. Cryptanalyzes permutation code, and proves that permutatio... 详细信息
来源: 评论
An AES crypto chip using a high-speed parallel pipelined architecture
收藏 引用
MICROPROCESSORS AND MICROSYSTEMS 2005年 第7期29卷 317-326页
作者: Yoo, SM Kotturi, D Pan, DW Blizzard, J Univ Alabama Dept Elect & Comp Engn Huntsville AL 35899 USA Cadence Design Syst Inc Plano TX USA
The number of Internet and wireless communications users has rapidly grown and that increases demand for security measures to protect user data transmitted over open channels. In December 200 1, the National Institute... 详细信息
来源: 评论
Experiences from Using the CORAS Methodology to Analyze a Web Application
收藏 引用
JOURNAL OF CASES ON INFORMATION TECHNOLOGY 2005年 第3期7卷 110-130页
作者: den Braber, Folker Mildal, Arne Bjorn Nes, Jone Stolen, Ketil Vraalsen, Fredrik Leiden Univ Comp Sci Leiden Netherlands NetCom IT & Internet Responsibil IT Dev Activ Oslo Norway NetCom Oslo Norway SINTEF Qual & Secur Technol Grp Dept Cooperat & Trusted Syst Informat & Commun Technol Trondheim Norway SINTEF Informat & Commun Technol Cooperat & Trusted Syst Grp Trondheim Norway
During a field trial performed at the Norwegian telecom company NetCom from May 2003 to July 2003, a methodology for model-based risk analysis was assessed. The chosen methodology was the CORAS methodology (CORAS, 200... 详细信息
来源: 评论
A more energy efficient network setup method for wireless sensor networks
A more energy efficient network setup method for wireless se...
收藏 引用
11th Asia-Pacific Conference on Communications
作者: Niati, R Yazdani, N Univ Teheran Dept Elect & Comp Engn Tehran 14174 Iran
Wireless sensor networks are one of the pioneer technologies of the new century. The low cost of these networks makes them applicable to a variety of areas from battlefields and environment monitoring to health and ho... 详细信息
来源: 评论
P-adic Shrinking-Multiplexing Generator
P-adic Shrinking-Multiplexing Generator
收藏 引用
3rd IEEE Intelligent Data Acquisition and Advanced Computing Systems
作者: Tasheva, Zhaneta Bedzhev, Borislav Stoyanov, Borislav NMU Fac Artillery & Air Defense Shumen Bulgaria
The need for stream ciphers in communication and information cryptographic systems is rapidly grown in the last twenty years. The stream ciphers usually use a pseudo-random number generator with large period, large li... 详细信息
来源: 评论
AES crypto chip utilizing high-speed parallel pipelined architecture
AES crypto chip utilizing high-speed parallel pipelined arch...
收藏 引用
IEEE International Symposium on Circuits and Systems (ISCAS)
作者: Kotturi, D Yoo, SM Blizzard, J Cadence Design Syst Plano TX 75093 USA
In November 2001, the National Institute of Standards and Technology (NIST) of the United States chose the Rijndael algorithm as the suitable Advanced encryption Standard (AES) to replace the Data encryption Standard ... 详细信息
来源: 评论
Performance comparison between TEA and Rijndael encryption algorithm for wireless sensor networks  15
Performance comparison between TEA and Rijndael encryption a...
收藏 引用
15th International Conference on Computer Applications in Industry and Engineering (CAINE-2002)
作者: Kanamori, Y Jovanov, E Yoo, SM Univ Alabama Dept Elect & Comp Engn Huntsville AL 35899 USA
Wireless sensor networking is an emerging technology having a wide range of potential applications. Since most wireless sensors have significantly limited memory capacity and power consumption, we need to implement fa... 详细信息
来源: 评论
Data encryption algorithms for Internet-based Real-Time Systems
Data Encryption Algorithms for Internet-based Real-Time Syst...
收藏 引用
2004 International Symposium on Distributed Computing and Applications to Business, Engineering and Science
作者: Li Hongyan~(1,2),Shuang H.Yang~(1,3),and Tan LianSheng~1 1 Department of Computer Science,Central China Normal University,Wuhan,China. 2 Department of Computer and Electronic Science,Hubei University of Economics,Wuhan,China 3 Department of Computer Science,Loughborough University,Loughborough,Leicestershire LE113TU,UK
In recent years,the Intemet has proved to be a powerful tool for real-time ***,security risk of the Intemet communication still stops people to bring the real-time application into a *** work has so far been done in d... 详细信息
来源: 评论