咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 102 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 279 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 235 篇 工学
    • 151 篇 计算机科学与技术...
    • 80 篇 电气工程
    • 53 篇 信息与通信工程
    • 24 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 16 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 30 篇 理学
    • 16 篇 数学
    • 13 篇 物理学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
    • 2 篇 工商管理
  • 13 篇 医学
    • 8 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 279 篇 encryption algor...
  • 71 篇 cryptography
  • 28 篇 encryption
  • 22 篇 security
  • 15 篇 data security
  • 15 篇 images
  • 14 篇 blockchain
  • 13 篇 imagery (psychot...
  • 13 篇 chaos
  • 12 篇 image
  • 11 篇 image encryption
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 9 篇 decryption
  • 8 篇 internet of thin...
  • 8 篇 privacy protecti...
  • 8 篇 authentication
  • 8 篇 cloud computing
  • 7 篇 chaotic systems

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 bandung inst tec...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...
  • 1 篇 dept. of compute...
  • 1 篇 nmu fac artiller...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 li haifeng
  • 2 篇 li jinqing
  • 2 篇 nan zhang
  • 2 篇 li ju
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 di xiaoqiang
  • 2 篇 hu guoliang
  • 2 篇 xiaoqiang zhang
  • 2 篇 susilo willy

语言

  • 269 篇 英文
  • 7 篇 其他
  • 3 篇 中文
检索条件"主题词=Encryption algorithm"
279 条 记 录,以下是31-40 订阅
排序:
Parallelization of encryption algorithm Based on Chaos System and Neural Networks  1
收藏 引用
10th International Conference on Parallel Processing and Applied Mathematics (PPAM)
作者: Burak, Dariusz West Pomeranian Univ Technol Fac Comp Sci & Informat Technol PL-71210 Szczecin Poland
In this paper, the results of parallelizing of encryption algorithm based on a chaos system and neural networks are presented. A data dependence analysis of loops was applied in order to parallelize the algorithm. The... 详细信息
来源: 评论
Simple encryption algorithm with Improved Performance in Wireless Communications
Simple Encryption Algorithm with Improved Performance in Wir...
收藏 引用
IEEE Radio and Wireless Symposium (RWS)
作者: Matalgah, Mustafa M. Magableh, Amer M. Univ Mississippi Radio & Wireless Dept Elect Engn University MS 38677 USA Jordan Univ Sci & Technol Dept Elect Engn Irbid Jordan
In this paper, inspired by network coding theory we propose an efficient hybrid encryption-coding algorithm that requires using traditional encryption only for the first small amount of data. This amount of data, whic... 详细信息
来源: 评论
Research on the Mobile Security encryption algorithm for Manufacturing Execution System  5
Research on the Mobile Security Encryption Algorithm for Man...
收藏 引用
IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER)
作者: Pan Fucheng Hu Guoliang Univ Chinese Acad Sci Beijing Peoples R China Chinese Acad Sci Shenyang Inst Automat Shenyang Peoples R China Chinese Acad Sci Shenyang Inst Automat Dept Digital Factory Shenyang Peoples R China
With the high-speed development of mobile terminal device, the mobile information application solution has been more and more common. According to the processing and manufacturing industry MES (Manufacturing Execution... 详细信息
来源: 评论
Analysis of the Effect of a Color Image encryption algorithm  3rd
Analysis of the Effect of a Color Image Encryption Algorithm
收藏 引用
3rd International Conference on Electrical Engineering and Information Technologies for Rail Transportation (EITRT)
作者: Guo, Yukun Hexi Univ Coll Informat Technol & Commun 846 Beihuan Rd Zhangye Gansu Peoples R China
Because of multimedia information has huge amount of data and high redundancy, traditional encryption technology is not suitable for multimedia information encryption. Multimedia information encryption get great devel... 详细信息
来源: 评论
A Novel encryption algorithm Usted for Power Emergency Communication System  4
A Novel Encryption Algorithm Usted for Power Emergency Commu...
收藏 引用
4th IEEE International Conference on Cloud Computing and Big Data Analysis (ICCCBDA)
作者: Cheng, Xiaowei Liu, Chao Qu, Qian Xiao, Bo Li, Wenhui Yuan, Bingyu Qiu, Yinghui China Gansu Elect Power Co Informat & Telecommun State Grid Corp Lanzhou Gansu Peoples R China North China Elect Power Univ Sch Elect & Elect Engn Beijing Peoples R China
With the increasing complexity of access and network structure of smart devices, there are many security threats in smart distribution networks. How to ensure the security of smart distribution network communication h... 详细信息
来源: 评论
Energy Consumptions Analysis for a Class of Symmetric encryption algorithm
Energy Consumptions Analysis for a Class of Symmetric Encryp...
收藏 引用
8th IEEE Radio and Wireless Symposium (RWS)
作者: Zibideh, Walid Y. Matalgah, Mustafa M. Qualcomm Technol Inc San Diego CA 92121 USA Univ Mississippi Dept Elect Engn University MS 38677 USA
Due to the increased demand on wireless devices and their applications, the necessity for efficient and secure encryption algorithms is critical. A secure encryption algorithm is considered energy efficient if it uses... 详细信息
来源: 评论
Parallelization of an encryption algorithm Based on a Spatiotemporal Chaotic System and a Chaotic Neural Network  15
Parallelization of an Encryption Algorithm Based on a Spatio...
收藏 引用
15th Annual International Conference on Computational Science (ICCS)
作者: Burak, Dariusz West Pomeranian Univ Technol Szczecin West Pomerania Poland
In this paper the results of parallelizing a block cipher based on a spatiotemporal chaotic system and a chaotic neural network are presented. A data dependence analysis of loops was applied in order to parallelize th... 详细信息
来源: 评论
Performance comparison between TEA and Rijndael encryption algorithm for wireless sensor networks  15
Performance comparison between TEA and Rijndael encryption a...
收藏 引用
15th International Conference on Computer Applications in Industry and Engineering (CAINE-2002)
作者: Kanamori, Y Jovanov, E Yoo, SM Univ Alabama Dept Elect & Comp Engn Huntsville AL 35899 USA
Wireless sensor networking is an emerging technology having a wide range of potential applications. Since most wireless sensors have significantly limited memory capacity and power consumption, we need to implement fa... 详细信息
来源: 评论
Research and Realization of Random encryption algorithm
Research and Realization of Random Encryption Algorithm
收藏 引用
International Conference on Internet Computing in Science and Engineering
作者: Gao Wei Zhang Guoyin Li Yanmei Chen Weihua Harbin Engn Univ Coll Comp Sci & Technol Harbin 150001 Peoples R China
With the research and discussion about different kinds of methods generating random number by computer and encryption algorithm, REA is raised from a practical standpoint. REA can make key sequence closer to true rand... 详细信息
来源: 评论
Blockchain encryption algorithm Based on Aggregated Signature  3
Blockchain Encryption Algorithm Based on Aggregated Signatur...
收藏 引用
2023 IEEE 3rd International Conference on Data Science and Computer Application, ICDSCA 2023
作者: Li, Guangye Ou, Chuang Xi'an Jiaotong-Liverpool University Suzhou China Central South University Changsha China
As the concept of blockchain continues to the hype, an increasing number of industries join the ranks of using blockchain, which also leads to privacy leaks becoming a potential hidden danger. Therefore, more secure a... 详细信息
来源: 评论