咨询与建议

限定检索结果

文献类型

  • 280 篇 会议
  • 104 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 333 篇 工学
    • 284 篇 计算机科学与技术...
    • 135 篇 软件工程
    • 106 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 51 篇 网络空间安全
    • 31 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 15 篇 动力工程及工程热...
    • 13 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 135 篇 理学
    • 88 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 59 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
    • 4 篇 工商管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 9 篇 法学
    • 6 篇 社会学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 389 篇 encryption algor...
  • 17 篇 cryptography
  • 10 篇 security
  • 7 篇 cloud computing
  • 5 篇 elliptic curve c...
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 internet of thin...
  • 4 篇 iot
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 308 篇 英文
  • 78 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=Encryption algorithms"
389 条 记 录,以下是111-120 订阅
排序:
Reducing energy consumption of mobile phones during data transmission and encryption for wireless body area network applications
收藏 引用
SECURITY AND COMMUNICATION NETWORKS 2015年 第17期8卷 2973-2980页
作者: DelBello, Chris Raihan, Kazi Zhang, Tao Loyola Univ Maryland Baltimore MD 21210 USA New York Inst Technol Old Westbury NY 11568 USA
Wireless body area networks (WBANs) are an exciting technology that will revolutionize physiological monitoring in the coming years. However, the widespread deployment of WBANs is restricted by steep energy limitation... 详细信息
来源: 评论
Improvement of Blowfish encryption algorithm based on Galois ring for electro-optical satellite images
收藏 引用
Multimedia Tools and Applications 2024年 1-20页
作者: Javid, Muhammad Khan, Majid Amin, Muhammad Department of Applied Mathematics and Statistics Institute of Space Technology Islamabad Pakistan Department of Mathematics College of Science and Humanities in Al-Kharj Prince Sattam Bin Abdulaziz University Al-Kharj11942 Saudi Arabia Department of Avionics Engineering Institute of Space Technology Islamabad Pakistan
The desire for new algebraic structures is always an interesting area of research for the design and development of new information confidentiality mechanisms. Confidentiality mechanism keeps information secure from u... 详细信息
来源: 评论
A Novel Approach for Integrating Security in Business Rules Modeling Using Agents and an encryption Algorithm
收藏 引用
JOURNAL OF INFORMATION PROCESSING SYSTEMS 2016年 第4期12卷 688-710页
作者: Houari, Nawal Sad Taghezout, Noria Univ Oran1 Ahmed BenBella Dept Comp Sci BP 1524 El Mnaouer Oran Algeria
Our approach permits to capitalize the expert's knowledge as business rules by using an agent-based platform. The objective of our approach is to allow experts to manage the daily evolutions of business domains wi... 详细信息
来源: 评论
Chaotic colour image encryption based on differential evolutionary deep learning
收藏 引用
International Journal of Information and Communication Technology 2024年 第7期25卷 57-74页
作者: Cai, Zhengbao College of Information Technology Anhui Vocational College of Defense Technology Lu’an237000 China
Traditional chaotic image encryption methods have certain limitations in terms of processing high-dimensional data, computational complexity and attack resistance, which limits their widespread promotion and use in pr... 详细信息
来源: 评论
A Secure and Efficient Optimized Image encryption Using Block Compressive Sensing and Logistic Map Method
收藏 引用
Journal of Cyber Security and Mobility 2024年 第5期13卷 983-1006页
作者: Abed, Qutaiba Kadhim Al-Jawher, Waleed Ameen Mahmoud Informatics Institute for Postgraduate Studies Iraqi Commission for Computers and Informatics Baghdad Iraq Uruk University Baghdad Iraq
Recently, multimedia has developed and become very important for transferring images securely through public networks. This paper uses the COOT optimization algorithm with compressive sensing (CS) for image encryption... 详细信息
来源: 评论
Research on encryption Protection of Patients’ Electronic Medical Privacy Data from the Legal Perspective
收藏 引用
International Journal of Network Security 2024年 第5期26卷 761-766页
作者: Wang, Feng Yang, Fei Tibet Police College The Tibet Autonomous Region No. 68 Duodi Road Chengguan District Lasa City850000 China
The medical privacy of patients is protected by law. This paper briefly introduces the legal basis of medical privacy protection and the attribute-based encryption algorithm used for encrypting medical privacy data. A... 详细信息
来源: 评论
Construction of embedded online teaching platform based on AES-RSA encryption algorithm
收藏 引用
Discover Artificial Intelligence 2024年 第1期4卷 1-16页
作者: Kong, Xiaojing Yue, Guanli Xuchang Vocational Technical College Xuchang China Henan Engineering Research Center of Data Intelligence and Security Application Xuchang China
With the development of economy, people's demand for high-quality and diversified educational resources increases. However, under the frequent occurrence of network attacks, data leakage and other events, network ... 详细信息
来源: 评论
Color Image encryption Based on Chaotic Systems and Dynamic Transformation Matrices
收藏 引用
International Journal of Network Security 2024年 第5期26卷 867-873页
作者: Xu, Chunming Zhang, Yong School of Mathematics and Statistics Yancheng Teachers University No.50 Kaifang Avenue Yancheng224002 China
Matrix transformation has been successfully used in image encryption. However, conventional image encryption algorithms often employ fixed transformation matrices, which limits the randomness and versatility of image ... 详细信息
来源: 评论
Enhancing Data Security of iOS Client by encryption Algorithm  2
Enhancing Data Security of iOS Client by Encryption Algorith...
收藏 引用
2nd IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)
作者: Shen, Yuli Wang, Hong Wuhan Univ Technol Sch Informat Engn Wuhan Hubei Peoples R China
iOS devices are steadily obtaining popularity of the majority of users because of its some unique advantages in recent *** can do many things that have been done on a desktop computer or *** the increase in the use of... 详细信息
来源: 评论
The Secure UAV Communication Link Based on OTP encryption Technique  11
The Secure UAV Communication Link Based on OTP Encryption Te...
收藏 引用
11th International Conference on Ubiquitous and Future Networks (ICUFN)
作者: Atoev, Sukhrob Kwon, Oh-Jun Kim, Chee-Yong Lee, Suk-Hwan Choi, Young-Rak Kwon, Ki-Ryong Pukyong Natl Univ Dept IT Convergence & Applicat Engn Busan South Korea Dong Eui Univ Dept Comp Software Engn Busan South Korea Dong Eui Univ Game Animat Engn Busan South Korea Tongmyong Univ Dept Informat Secur Busan South Korea A&C Co Seoul South Korea
The demand on the security and reliability of the communication and data link of unmanned aerial vehicle (UAV) is much higher since the environment of the modern battlefield is becoming more and more complex. Since th... 详细信息
来源: 评论