咨询与建议

限定检索结果

文献类型

  • 279 篇 会议
  • 102 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 386 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 330 篇 工学
    • 281 篇 计算机科学与技术...
    • 134 篇 软件工程
    • 105 篇 信息与通信工程
    • 84 篇 电气工程
    • 84 篇 控制科学与工程
    • 50 篇 网络空间安全
    • 31 篇 电子科学与技术(可...
    • 24 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 安全科学与工程
    • 22 篇 交通运输工程
    • 15 篇 动力工程及工程热...
    • 13 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 134 篇 理学
    • 88 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 13 篇 化学
    • 11 篇 系统科学
  • 59 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
    • 4 篇 工商管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 9 篇 法学
    • 6 篇 社会学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 386 篇 encryption algor...
  • 17 篇 cryptography
  • 10 篇 security
  • 7 篇 cloud computing
  • 5 篇 elliptic curve c...
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 internet of thin...
  • 4 篇 iot
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 307 篇 英文
  • 76 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=Encryption algorithms"
386 条 记 录,以下是1-10 订阅
排序:
New Approach to Crossover of encryption algorithms  8th
New Approach to Crossover of Encryption Algorithms
收藏 引用
8th EAI International Conference on Future Access Enablers of Ubiquitous and Intelligent Infrastructures, FABULOUS 2024
作者: Pekarčik, Peter Chovancová, Eva Chovanec, Martin Kuchčáková, Tatiana Technical University of Kosice Košice04001 Slovakia
Our work presents a novel approach to creating new encryption algorithms. We were inspired by genetic algorithms based on the Darwin evolution theory. As the method of invention, we chose the crossover technique. We a... 详细信息
来源: 评论
A Comprehensive Security and Performance Analysis of Chaotic-Based Hybrid Image encryption algorithms  5th
A Comprehensive Security and Performance Analysis of Chaotic...
收藏 引用
5th EAI International Conference on Cognitive Computing and Cyber Physical Systems, IC4S 2024
作者: Sivakumar, P. Kalyani, A. Thanuja, V. Nohitha, G. Sai, S.L. Sasi Institute of Technology and Engineering Tadepalligudem India
The susceptibility of digital image communication is a crucial issue in the domain of digital transfer. The image encryption literature has presented numerous cryptosystems to enhance communication security. Image enc... 详细信息
来源: 评论
Implementing encryption algorithms for the Protection of Wireless Networks  5th
Implementing Encryption Algorithms for the Protection of Wir...
收藏 引用
5th International Conference on Data Science, Machine Learning and Applications, ICDSMLA 2023
作者: Ahmad, Naseem Madhura, K. Agarwal, Trapty Zaidi, Taskeen Department of Computer Science and Engineering School of Engineering and Computing Dev Bhoomi Uttarakhand University Navgaon Manduwala Dehradun India School of Computer Science and Engineering Presidency University Karnataka Bengaluru India Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India Karnataka Bangalore India
The use of encryption algorithms is more and more turning into a crucial issue of defensive wireless networks. encryption algorithms may be used to cozy facts that is transferred over a Wi-Fi network while also presen... 详细信息
来源: 评论
Support Verifiable IoT Perception Layer Information Search and encryption algorithms
收藏 引用
International Journal of Network Security 2024年 第6期26卷 1053-1062页
作者: Zhang, Lijun College of Digital Technology & Design Shanghai Sipo Polytechnic Shanghai 201399 China
With the rise of IoT technology, the usage of IoT devices and systems is steadily increasing. However, concerns over excessive overhead and data security in IoT perceptual layer communication are becoming increasingly... 详细信息
来源: 评论
RESEARCH ON PRIVACY DATA SECURITY PROTECTION IN SENSOR NETWORKS USING encryption algorithms
UPB Scientific Bulletin, Series C: Electrical Engineering an...
收藏 引用
UPB Scientific Bulletin, Series C: Electrical Engineering and Computer Science 2024年 第3期86卷 25-34页
作者: Yao, Yunxia Peng, Renjie Mi, Wenli School of Mathematics and Information Engineering Longdong University Gansu Qingyang745000 China School of Intelligent Manufacturing Longdong University Gansu Qingyang745000 China
This paper briefly introduces wireless sensor networks (WSNs) and proposes an enhancement to a block encryption algorithm using chaotic mapping principles. The proposed encryption algorithm was tested on an establishe... 详细信息
来源: 评论
Research on storage optimization and encryption algorithms for CD disc management system  2nd
Research on storage optimization and encryption algorithms f...
收藏 引用
2nd International Conference on Computer, Intelligent Computing and Education Technology (CICET)
作者: Feng, Wei Gang Zhang, Wei Ting Xianyang Vocat Tech Coll Xianyang Shaanxi Peoples R China
With the bursting and fast development of computer science and CD-ROM technology, the storage optimization and related encryption algorithms are studied popularly. Due to the emergence of heterogeneous cloud storage s... 详细信息
来源: 评论
Performance Measurement of encryption algorithms and Their Effect on Real Running in PLC Networks
Performance Measurement of Encryption Algorithms and Their E...
收藏 引用
35th International Conference on Telecommunications and Signal Processing (TSP)
作者: Halas, Michal Bestak, Ivan Orgon, Milos Kovac, Adrian Slovak Univ Technol Bratislava Fac Elect Engn & Informat Technol SK-81219 Bratislava Slovakia
This article and its outputs reveal the need of search for the most suitable encryption algorithm used in PLC devices, the procedure for simulating performance of encryption algorithm and practical measurement of thro... 详细信息
来源: 评论
A STUDY ON encryption algorithms AND MODES FOR DISK encryption
A STUDY ON ENCRYPTION ALGORITHMS AND MODES FOR DISK ENCRYPTI...
收藏 引用
International Conference on Signal Processing Systems (ICSPS 2009)
作者: Alomari, Mohammad Ahmed Samsudin, Khairulmizam Ramli, Abdul Rahman Univ Putra Malaysia Fac Engn Comp Syst Res Grp Serdang 43400 Malaysia Univ Putra Malaysia Inst Syst & Robot Lab Serdang 43400 Malaysia
Data storage devices such as disk drives and personal storage devices (PSD) such as flash disks are now widely used in everyday appliances. Data breaches have grown rapidly in the recent years due to compromised confi... 详细信息
来源: 评论
Novel Performance Metric for encryption algorithms Used in Wireless Sensor Networks  8
Novel Performance Metric for Encryption Algorithms Used in W...
收藏 引用
8th IEEE Symposium on Wireless Technology and Applications, ISWTA 2024
作者: Alwakeel, Mohammed Faculty of Computers and Information Technology University of Tabuk Tabuk Saudi Arabia
Wireless sensor networks are vulnerable to attacks that can compromise the data transmitted through them. To ensure security and confidentiality, encryption algorithms are necessary. To evaluate the effectiveness of e... 详细信息
来源: 评论
An Analysis of Light Weight Symmetric encryption algorithms for Secure Data Transmission in IoT
An Analysis of Light Weight Symmetric Encryption Algorithms ...
收藏 引用
2024 International Conference on Intelligent algorithms for Computational Intelligence Systems, IACIS 2024
作者: Kumar, Sanjay Pillai, C.S. Bengaluru India Acs College of Engineering Department of CSE-Data Science Bengaluru India
The Internet of Things (IoT) consists of a network of resource-constrained devices, sensors, and machines that are interconnected and communicate via the internet. However, these devices often struggle while handling ... 详细信息
来源: 评论