咨询与建议

限定检索结果

文献类型

  • 280 篇 会议
  • 104 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 333 篇 工学
    • 284 篇 计算机科学与技术...
    • 135 篇 软件工程
    • 106 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 51 篇 网络空间安全
    • 31 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 15 篇 动力工程及工程热...
    • 13 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 135 篇 理学
    • 88 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 59 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
    • 4 篇 工商管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 9 篇 法学
    • 6 篇 社会学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 389 篇 encryption algor...
  • 17 篇 cryptography
  • 10 篇 security
  • 7 篇 cloud computing
  • 5 篇 elliptic curve c...
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 internet of thin...
  • 4 篇 iot
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 308 篇 英文
  • 78 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=Encryption algorithms"
389 条 记 录,以下是101-110 订阅
排序:
Looking for Variant of S-box Used in AES Algorithm  1st
Looking for Variant of S-box Used in AES Algorithm
收藏 引用
1st International Conference on Computational Technologies and Electronics, ICCTE 2023
作者: Hasanujjaman, Md. Zaman, J. K. M. Sadique Uz Sheikhpara Abdur Rahaman Memorial Polytechnic West Bengal Murshidabad India Department of Computer Science and Technology University of North Bengal Siliguri India
Symmetric key block ciphers are the most widely used data encryption algorithm and is well known for its ability to protect against a wide range of attack. The effectiveness of a block cipher algorithm often depends o... 详细信息
来源: 评论
On the Semantic Security of NTRU - with a gentle introduction to cryptography
arXiv
收藏 引用
arXiv 2025年
作者: Peet-Pare, Liam Department of Mathematics and Statistics Faculty of Science University of Ottawa Canada
This paper provides an explanation of NTRU, a post quantum encryption scheme, while also providing a gentle introduction to cryptography. NTRU is a very efficient lattice based cryptosystem that appears to be safe aga... 详细信息
来源: 评论
Novel 2D nonlinear sine-log-sqrt-logistic map and staircase block scrambling for a rapid image encryption algorithm
收藏 引用
Journal of Information Security and Applications 2025年 92卷
作者: Meng-meng Wang Shun-wen Jin Hongxia Wang Man-tao Xu Si-hang Liu School of Information and Control Engineering Qingdao University of Technology Qingdao 266033 PR China College of Information Technology Shanghai Jian Qiao University Co Ltd 201315 Shanghai PR China School of Intelligent Manufacturing Jiangxi Science and Technology Normal University Nanchang 330038 PR China
In this paper, we propose a nonlinear 2-dimensional hyperchaotic map, called the 2D nonlinear sine-log-sqrt-logistic map (2D-NSLSLM), which introduces both the logarithmic function and the square root function. By inc... 详细信息
来源: 评论
Efficient Android-based storage encryption using multi-core CPUs
收藏 引用
SECURITY AND COMMUNICATION NETWORKS 2016年 第18期9卷 5673-5686页
作者: Alomari, Mohammad Ahmed Samsudin, Khairulmizam Ramli, Abdul Rahman Hashim, Shaiful J. Univ Putra Malaysia Fac Engn Comp & Commun Syst Serdang 43400 Malaysia
The huge proliferation of mobile and handheld devices, such as tablets and Smartphone devices, has come with different threats to the sensitive data and personally identifiable information stored inside these devices.... 详细信息
来源: 评论
New video encryption schemes based on chaotic maps
收藏 引用
IET IMAGE PROCESSING 2020年 第2期14卷 397-406页
作者: Elkamchouchi, Hassan Salama, Wessam M. Abouelseoud, Yasmine Alexandria Univ Fac Engn Dept Elect Engn Alexandria Egypt Pharos Univ Dept Basic Sci Alexandria Egypt Alexandria Univ Fac Engn Dept Engn Math Alexandria Egypt
Two new encryption algorithms for secure video transmission are proposed in this paper. The two algorithms employ different types of chaotic maps to generate the keystream for encrypting the video frames. Both algorit... 详细信息
来源: 评论
Energy Efficient Data encryption Techniques in Smartphones
收藏 引用
WIRELESS PERSONAL COMMUNICATIONS 2019年 第4期106卷 2023-2035页
作者: Mujtaba, Ghulam Tahir, Muhammad Soomro, Muhammad Hanif Gachon Univ Dept Comp Engn Comp Sci Seongnam South Korea Sir Syed Univ Dept Comp Engn Karachi Pakistan Univ Sindh Dept Informat Technol Jamshoro Pakistan
Mobile devices have been increased exceptionally in recent years, consequently data generation has also been raised exceptionally. Most of the data generated by mobile devices is transferred to servers for processing ... 详细信息
来源: 评论
Image encryption algorithm based on image hashing, improved chaotic mapping and DNA coding
收藏 引用
IET IMAGE PROCESSING 2019年 第14期13卷 2905-2915页
作者: Zhang, Qiuyu Han, Jitian Ye, Yutong Lanzhou Univ Technol Sch Comp & Commun Lanzhou 730050 Gansu Peoples R China
In order to improve the problems of security and robustness for existing image encryption algorithms and to reduce the security risks of encryption algorithms against statistical analysis, differential attacks, exhaus... 详细信息
来源: 评论
Designing a novel image encryption scheme based on an improved 2D logistic map
收藏 引用
JOURNAL OF APPLIED PHYSICS 2024年 第12期136卷
作者: Liu, Shuang Ye, Xiaolin Anshan Normal Univ Sch Math Anshan 114005 Liaoning Peoples R China Univ Sci & Technol Liaoning Sch Elect & Informat Engn Anshan 114051 Peoples R China
This paper presents an improved two-dimensional logistic map. Relative to the original logistic map, the improved chaos map has better performance, e.g., larger chaotic range, higher complexity, and boosting sequence.... 详细信息
来源: 评论
A fuzzy ontology-based context-aware encryption approach in IoT through device and information classification
收藏 引用
JOURNAL OF SUPERCOMPUTING 2024年 第16期80卷 23311-23356页
作者: Zeshan, Furkh Dar, Zaineb Ahmad, Adnan Malik, Tariq COMSATS Univ Lahore Campus Islamabad Pakistan St Louis Univ Madrid Spain Univ Glasgow Glasgow Scotland
IoT devices produce a vast amount of data ranging from personal to sensitive information. Usually, these devices remain connected to the internet so protecting the information produced by them is crucial. Since most o... 详细信息
来源: 评论
A Strong Password Manager Using Multiple encryption Techniques
收藏 引用
Journal of The Institution of Engineers (India): Series B 2024年 1-8页
作者: Baskar, K. Muthumanickam, K. Vijayalakshmi, P. Kumarganesh, S. Department of AIDS Kongunadu College of Engineering and Technology Tamil Nadu Trichy India Department of IT Kongunadu College of Engineering and Technology Tamil Nadu Trichy India Department of CSE Knowledge Institute of Technology Tamil Nadu Salem India Department of ECE Knowledge Institute of Technology Tamil Nadu Salem India
Despite being frequently advised by security professionals, few users still utilise password managers. This is due to security issues including secrecy and privacy, among others. Sensitive data is frequently protected... 详细信息
来源: 评论