咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 118 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 295 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 248 篇 工学
    • 157 篇 计算机科学与技术...
    • 84 篇 电气工程
    • 55 篇 信息与通信工程
    • 26 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 36 篇 理学
    • 19 篇 物理学
    • 16 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 295 篇 encryption algor...
  • 81 篇 cryptography
  • 27 篇 encryption
  • 25 篇 security
  • 17 篇 images
  • 16 篇 image
  • 15 篇 data security
  • 15 篇 imagery (psychot...
  • 14 篇 blockchain
  • 12 篇 chaos
  • 11 篇 image encryption
  • 11 篇 decryption
  • 10 篇 algorithms
  • 10 篇 security level
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 8 篇 internet of thin...
  • 8 篇 privacy protecti...

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li hong
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang

语言

  • 281 篇 英文
  • 11 篇 其他
  • 3 篇 中文
检索条件"主题词=Encryption algorithm"
295 条 记 录,以下是61-70 订阅
排序:
Adopting Tiny encryption algorithm for Patient Healthcare Record on Smart Card
Adopting Tiny Encryption Algorithm for Patient Healthcare Re...
收藏 引用
International Conference of Computer Science and Information Technology
作者: Muhammad Rizki Adiwiganda Endro Ariyanto Rahmat Yasirandi Novian Anggis Suwastika Yoso Adi Setyoko School of Computing Telkom University Bandung Indonesia Industrial and Informatics Faculty Telkom Institute of Technology Purwokerto Indonesia
Smart Card is something that is used for data transactions quickly and practically. The definition of ”smart” is when a card has a chip implanted. The card is very helpful in the authentication and administration pr... 详细信息
来源: 评论
Research and Realization based on hybrid encryption algorithm of improved AES and ECC
Research and Realization based on hybrid encryption algorith...
收藏 引用
2010 International Conference on Audio,Language and Image Processing(2010年音频、语言与图像处理国际会议 ICALIP 2010)
作者: Xiang Li Junli Chen Dinghu Qin Wanggen Wan School of Communication and Information Engineering Shanghai University Shanghai 200072China
Advanced encryption Standard (AES) and Elliptic Curve Cryptosystems (ECC) is the best two algorithms of symmetric encryption technology and asymmetric encryption technology. The paper analyzes the AES algorithm and S-... 详细信息
来源: 评论
A Novel Bit-level Image encryption algorithm Based on Coarse-grained Chaotic Signals
A Novel Bit-level Image Encryption Algorithm Based on Coarse...
收藏 引用
International Conference on Image, Vision and Computing (ICIVC)
作者: Yujie Sun Pengfei Yan Hao Zhang Yong Zhang Department of Software North Automatic Control Technology Institute Taiyuan Shanxi China College of Information and Computer Taiyuan University of Technology Taiyuan Shanxi China
In this paper, a novel image encryption algorithm based on coarse-grained chaotic signals in which scrambling and diffusion are both covered. First, the chaotic signals are handled with unfixed coarse-grained key inst... 详细信息
来源: 评论
A New Image encryption algorithm Using Truncated P-Fibonacci Bit-planes
A New Image Encryption Algorithm Using Truncated P-Fibonacci...
收藏 引用
IEEE International Conference on Systems, Man, and Cybernetics
作者: Weijia Cao Yicong Zhou C. L. Philip Chen Department of Computer and Information Science University of Macau Department of computer and Information Science University of Macau
Image encryption is an effective approach to protect privacy and security of images. This paper introduces a novel image encryption algorithm using the Truncated P-Fibonacci Bit-planes as security key images to encryp... 详细信息
来源: 评论
Digital Image encryption algorithm Based on Pixels
Digital Image Encryption Algorithm Based on Pixels
收藏 引用
2010 IEEE International Conference on Intelligent Computing and Intelligent Systems(2010 IEEE 智能计算与智能系统国际会议 ICIS 2010)
作者: Mengmeng Wang Guiliang Zhu Weiping Wang Xiaoqiang Zhang Department of In formation Engineering North China University of Water Conservancy and Electric Pow Department of In formation Engineering North China University of Water Conservancy and Electric Powe State Key Lab of Software Development Environment Beijing University of Aeronautics and Astronautic
A new image encryption algorithm based on pixels is proposed in this paper. All the strategies, programs, parameters, encryption and decryption steps and other key technologies arc given in detail. First, scrambling t... 详细信息
来源: 评论
ZGW-1 DIGITAL IMAGE encryption algorithm BASED ON THREE LEVELS AND MULTILAYER SCRAMBLE
ZGW-1 DIGITAL IMAGE ENCRYPTION ALGORITHM BASED ON THREE LEVE...
收藏 引用
2010 2nd IEEE International Conference on Network Infrasturcture & Digital Content(2010年第二届IEEE网络基础设施与数字内容国际会议 IC-NIDC 2010)
作者: Mengmeng Wang Weiping Wang Guiliang Zhu Xiaoqiang Zhang Department of Information Engineering North China University of Water Conservancy and Electric Powe State Key Lab of Software Development Environment Beijing University of Aeronautics and Astronautic
A new image encryption algorithm based on three levels and multilayer scramble is proposed in this *** scrambling schemes can be divided into primary, intermediate and advanced levels, with gradually increasing securi... 详细信息
来源: 评论
End-to-end speech encryption algorithm based on speech scrambling in frequency domain
End-to-end speech encryption algorithm based on speech scram...
收藏 引用
Third International Conference on Cyberspace Technology (CCT 2015)
作者: Yaoyao Chen Jianhua Hao Jianbiao Chen Zibo Zhang PLA Equipment Academy Beijing China 101416
The security situation of mobile communication becomes even more grim, at present, the complete bug-free secure communications system solutions has not been found. For the realization of the end to end secure encrypte... 详细信息
来源: 评论
A block encryption algorithm based on exponentiation transform
收藏 引用
COGENT ENGINEERING 2020年 第1期7卷 Article: 1788292页
作者: Kapalova, Nursulu Khompysh, Ardabek Arici, Muslum Algazy, Kunbolat Inst Informat & Computat Technol RK MES CS Alma Ata Kazakhstan Al Farabi Kazakh Natl Univ Alma Ata Kazakhstan Kocaeli Univ Mech Engn Dept Izmit Turkey
This paper proposes a new block encryption algorithm for cryptographic information protection. It describes a new transformation method EM (Exponentiation Module), which is part of the algorithm, and a method of S-box... 详细信息
来源: 评论
A New Chaos-Based Image-encryption and Compression algorithm
收藏 引用
JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING 2012年 第unknown期2012卷 179693.1-179693.11页
作者: Al-Maadeed, Somaya Al-Ali, Afnan Abdalla, Turki Qatar Univ Dept Comp Sci & Engn POB 2713 Doha Qatar Univ Basrah Coll Engn Dept Comp Engn Basrah Iraq
We propose a new and efficient method to develop secure image-encryption techniques. The new algorithm combines two techniques: encryption and compression. In this technique, a wavelet transform was used to decompose ... 详细信息
来源: 评论
An adaptive approach for securing patient data in intellectual disability care with 8D Hyperchaotic DNA encryption and IWT
收藏 引用
BIOMEDICAL SIGNAL PROCESSING AND CONTROL 2025年 100卷
作者: Anisha, J. R. Teen, Y. P. Arul Univ Coll Engn Nagercoil Tamil Nadu India
Intellectual disability (ID) is a neurodevelopmental disease characterized by significant intellectual and adaptive functioning impairments. Continuous monitoring and data collection are crucial for managing this cond... 详细信息
来源: 评论