咨询与建议

限定检索结果

文献类型

  • 174 篇 会议
  • 118 篇 期刊文献
  • 2 篇 学位论文
  • 1 册 图书

馆藏范围

  • 295 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 248 篇 工学
    • 157 篇 计算机科学与技术...
    • 84 篇 电气工程
    • 55 篇 信息与通信工程
    • 26 篇 软件工程
    • 21 篇 网络空间安全
    • 20 篇 控制科学与工程
    • 19 篇 电子科学与技术(可...
    • 12 篇 机械工程
    • 9 篇 材料科学与工程(可...
    • 5 篇 仪器科学与技术
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 食品科学与工程(可...
    • 2 篇 安全科学与工程
  • 36 篇 理学
    • 19 篇 物理学
    • 16 篇 数学
    • 3 篇 化学
    • 3 篇 系统科学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
  • 22 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 12 篇 医学
    • 7 篇 临床医学
    • 3 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 295 篇 encryption algor...
  • 81 篇 cryptography
  • 27 篇 encryption
  • 25 篇 security
  • 17 篇 images
  • 16 篇 image
  • 15 篇 data security
  • 15 篇 imagery (psychot...
  • 14 篇 blockchain
  • 12 篇 chaos
  • 11 篇 image encryption
  • 11 篇 decryption
  • 10 篇 algorithms
  • 10 篇 security level
  • 9 篇 authentication
  • 9 篇 block cipher
  • 9 篇 cryptanalysis
  • 9 篇 aes
  • 8 篇 internet of thin...
  • 8 篇 privacy protecti...

机构

  • 3 篇 chongqing techno...
  • 2 篇 state key lab of...
  • 2 篇 zhengzhou univ l...
  • 2 篇 yanshan univ sch...
  • 2 篇 bandung inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 dalian maritime ...
  • 2 篇 anyang normal un...
  • 2 篇 cent univ punjab...
  • 2 篇 zhengzhou univ l...
  • 2 篇 ctr dev adv comp...
  • 2 篇 brno university ...
  • 2 篇 univ alabama dep...
  • 2 篇 department of co...
  • 2 篇 beijing elect sc...
  • 2 篇 communication un...
  • 1 篇 sch commun engn ...
  • 1 篇 telkom univ sch ...
  • 1 篇 whuhan univ sch ...
  • 1 篇 guangxi police c...

作者

  • 4 篇 zou chengye
  • 3 篇 yoo sm
  • 2 篇 kotturi d
  • 2 篇 boyd c
  • 2 篇 li haifeng
  • 2 篇 nan zhang
  • 2 篇 li hong
  • 2 篇 li ju
  • 2 篇 jakimoski g
  • 2 篇 wang xingyuan
  • 2 篇 liu zhen
  • 2 篇 wang wei
  • 2 篇 mu yi
  • 2 篇 kumar sandeep
  • 2 篇 garg ashish
  • 2 篇 kocarev l
  • 2 篇 singh deep
  • 2 篇 gupta kamlesh ku...
  • 2 篇 hendrawan
  • 2 篇 hu guoliang

语言

  • 281 篇 英文
  • 11 篇 其他
  • 3 篇 中文
检索条件"主题词=Encryption algorithm"
295 条 记 录,以下是81-90 订阅
排序:
Evaluating the Security of Logic encryption algorithms
Evaluating the Security of Logic Encryption Algorithms
收藏 引用
IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
作者: Subramanyan, Pramod Ray, Sayak Malik, Sharad Princeton Univ Dept Elect Engn Princeton NJ 08544 USA
Contemporary integrated circuits are designed and manufactured in a globalized environment leading to concerns of piracy, overproduction and counterfeiting. One class of techniques to combat these threats is logic enc... 详细信息
来源: 评论
A Comparative Study of encryption algorithms in Wireless Sensor Network
A Comparative Study of Encryption Algorithms in Wireless Sen...
收藏 引用
International Conference on Wireless Communications, Networking and Applications (WCNA)
作者: Xi, Zonghu Li, Li Shi, Guozhen Wang, Shuaibing Xidian Univ Sch Comp Sci & Technol Xian 710071 Peoples R China Beijing Elect Sci & Technol Inst Dept Elect Engn Beijing 100070 Peoples R China
With the development of the Internet of Things, the Wireless Senor Network has been paid increasing attention. It can not only perceive the physical world, collect and transmit information, but also brings new problem... 详细信息
来源: 评论
A Prototype of Electronic Toll Collection System based on encryption algorithms and Intellectual Technology
A Prototype of Electronic Toll Collection System based on En...
收藏 引用
International Conference on Computational Materials Science (CMS 2011)
作者: Geng, Zhang Chongqing Technol & Business Inst Chongqing Peoples R China
In the design of the proposed ETC scheme, all three major intelligent systems, such as AVC, AVI, and AVE have been included, where in each case some advanced technological features have been introduced. Moreover, incl... 详细信息
来源: 评论
Light with orbital angular momentum and encryption algorithms
Light with orbital angular momentum and encryption algorithm...
收藏 引用
Saratov Fall Meeting (SFM) on Laser Physics and Photonics XVIII;and Computational Biophysics and Analysis of Biomedical Data IV / 5th International Symposium on Optics and Biophotonics
作者: Burlov, Sergey A. Gorokhov, Alexander V. Samara Natl Res Univ 34 Moskovskoe Shosse Samara 443086 Russia
Two algorithms are presented that use the properties of twisted light to construct symmetric encryption schemes. Their possible physical realization is discussed.
来源: 评论
Blockchain-based optimization of operation and trading among multiple microgrids considering market fairness
收藏 引用
INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS 2025年 166卷
作者: Liu, Hao Lu, Tianguang Yang, Yueping Guo, Yu Wu, Qinzheng Xu, Xiaotong Zeng, Haibing Shandong Univ Sch Elect & Engn Jinan 250061 Peoples R China Ningbo Power Supply Co State Grid Corp China Ningbo 315000 Peoples R China
The microgrid (MG) provides a viable pathway for integrating distributed energy resources (DERs). With the development of the electricity market, the current challenge lies in guiding DERs to enter the market correctl... 详细信息
来源: 评论
Performance Trade-offs of encryption algorithms For Wireless Sensor Networks
Performance Trade-offs of Encryption Algorithms For Wireless...
收藏 引用
World Congress on Computer Applications and Information Systems (WCCAIS)
作者: Trad, Abdelbasset Bahattab, Abdullah Ali Ben Othman, Soufiene Univ Sousse ISITC UR PRINCE Sousse Tunisia Coll Telecomm & Elect Jeddah Saudi Arabia
Several security mechanisms have been introduced to address the need for reliable and efficient security schemes in resource limited Wireless Sensor Networks (WSNs). Limitations in processing speed, battery power, ban... 详细信息
来源: 评论
encryption algorithms Modeling in Detecting Man in the Middle Attack in Medical Organizations
收藏 引用
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS 2022年 第8期13卷 64-76页
作者: Alnasser, Sulaiman Alsaqour, Raed Saudi Elect Univ Coll Comp & Informat Dept Informat Technol Riyadh 93499 Saudi Arabia
A cyberattack is a serious crime that could affect medical organizations. These attacks could affect medical organization sensitive data disclosure, loss of organization data, or the business's continuity. The Man... 详细信息
来源: 评论
Securing IoT devices with fast and energy efficient implementation of PRIDE and PRESENT ciphers
Cyber Security and Applications
收藏 引用
Cyber Security and Applications 2025年 3卷
作者: Dahiphale, Vijay Raut, Hrishikesh Bansod, Gaurav Dahiphale, Devendra Binghamton University Binghamton United States North Carolina State University Raleigh United States Pune Institute of Computer Technology Pune India University of Maryland Baltimore County Maryland United States
The rise of low-power, cost-efficient internet-connected devices has led to a need for lightweight cryptography. The lightweight block cipher PRIDE, designed by Martin R. Albrecht, is one of the most efficient ciphers... 详细信息
来源: 评论
A selective image encryption scheme using LICC hyperchaotic system
收藏 引用
IET IMAGE PROCESSING 2022年 第12期16卷 3342-3358页
作者: Wei, Chengjing Li, Guodong Guilin Univ Elect Technol Sch Math & Computat Sci Guilin 541004 Guangxi Peoples R China Lab Guangxi Coll & Univ Key Lab Data Anal & Computat Guilin Guangxi Peoples R China
In this paper, an improved multi-dimensional hyperchaotic system derived from the logistic map and the ICMIC based on closed-loop coupling (LICC hyperchaotic system) is proposed and it is used in the design of selecti... 详细信息
来源: 评论
Advanced encryption standard based on key dependent S-Box cube
收藏 引用
IET INFORMATION SECURITY 2019年 第6期13卷 552-558页
作者: Seghier, Athmane Li, Jianxin Sun, Da Zhi Beihang Univ Beijing Adv Innovat Ctr Big Data & Brain Comp Beijing Peoples R China Tianjin Univ Sch Comp Sci & Technol Tianjin Peoples R China
The advanced encryption standard (AES) is the most encryption algorithm used around the world. This fact made it coveted by several cryptanalysis attacks. Some of them succeed to reveal certain weakness, due to its st... 详细信息
来源: 评论