咨询与建议

限定检索结果

文献类型

  • 280 篇 会议
  • 104 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 333 篇 工学
    • 284 篇 计算机科学与技术...
    • 135 篇 软件工程
    • 106 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 51 篇 网络空间安全
    • 31 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 15 篇 动力工程及工程热...
    • 13 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 135 篇 理学
    • 88 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 59 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
    • 4 篇 工商管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 9 篇 法学
    • 6 篇 社会学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 389 篇 encryption algor...
  • 17 篇 cryptography
  • 10 篇 security
  • 7 篇 cloud computing
  • 5 篇 elliptic curve c...
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 internet of thin...
  • 4 篇 iot
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 308 篇 英文
  • 78 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=Encryption algorithms"
389 条 记 录,以下是131-140 订阅
排序:
Image encryption Based on Chen Chaotic System, OpenSSL S-Box and the Fibonacci Q-Matrix  27
Image Encryption Based on Chen Chaotic System, OpenSSL S-Box...
收藏 引用
27th IEEE Signal Processing: algorithms, Architectures, Arrangements, and Applications, SPA 2024
作者: Lotfy, Rana Gabr, Mohamed Mamdouh, Eyad Aboshousha, Amr Alexan, Wassim El-Damak, Dina Fathy, Abdallah Mansour, Marvy Badr Monir German University in Cairo Faculty of MET Cairo Egypt German University in Cairo Physics Department Cairo Egypt German University in Cairo Faculty of IET Cairo Egypt ElSewedy University of Technology - Polytechnic of Egypt Faculty of Engineering Technology Department of Electronic Engineering Technology Cairo Egypt The British University in Egypt Faculty of Engineering Department of Electrical Engineering Cairo Egypt
This paper presents a novel image encryption algorithm that leverages the chaotic properties of the Chen system, the cryptographic strength of OpenSSL, and the mathematical robustness of the Fibonacci Q-Matrix. The pr... 详细信息
来源: 评论
Data Protection in the Era of Big Data Advanced encryption Standard VS Data encryption Standard  2
Data Protection in the Era of Big Data Advanced Encryption S...
收藏 引用
2nd International Conference Computational and Characterization Techniques in Engineering and Sciences, IC3TES 2024
作者: Mageshwaran, M.K. Sri Ramya, P. Saveetha University Saveetha School of Engineering Saveetha Institution of Medical and Technical Sciences Department of Information Technology Tamil Nadu Chennai India Saveetha University Saveetha School of Engineering Saveetha Institution of Medical and Technical Sciences Department of Computer Science and Engineering Tamil Nadu Chennai India
This research is to seek to know which algorithm between the DES (Data encryption Standard) and AES (Advanced encryption Standard) is faster in encryption and decryption as well as determine which is safer The data se... 详细信息
来源: 评论
A Generalized Image encryption Algorithm Utilizing the Single Switch Jerk Chaotic Oscillator
A Generalized Image Encryption Algorithm Utilizing the Singl...
收藏 引用
2024 Advances in Science and Engineering Technology International Conferences, ASET 2024
作者: Saleem, Heydar Ansar Mohammad, Abdulaziz Abdullatif Bonny, Talal University of Sharjah Computer Engineering Department Sharjah United Arab Emirates
Due to today's constantly evolving online atmosphere the demand for security is at an all time high. Countless forms of media are being shared by users over the internet, with pictures being one such prevalent for... 详细信息
来源: 评论
A Multi-staged Dynamic encryption Scheme Utilizing Composite Chaotic Maps
A Multi-staged Dynamic Encryption Scheme Utilizing Composite...
收藏 引用
2024 IEEE Conference on Advanced Topics on Measurement and Simulation, ATOMS 2024
作者: Cheroiu, Dominic-Gabriel Raducanu, Mircea Macovei Nitu, Corina Webhelp Romania SRL Bucharest Romania University POLITEHNICA of Bucharest Faculty of Electronics Telecommunications and Information Technology Telecommunications Dept. Romania Faculty of Electronics Telecommunications and Information Technology University POLITEHNICA of Bucharest Applied Electronics Dept. Romania
Today encryption is a necessary step in the storage and transmission of information. Although very secure, well-known encryption algorithms are slow. Considering these aspects the aim of this work is to propose a secu... 详细信息
来源: 评论
Image encryption Algorithm-Based Reversible Data Hiding With Triple Des  10
Image Encryption Algorithm-Based Reversible Data Hiding With...
收藏 引用
10th International Conference on Advanced Computing and Communication Systems, ICACCS 2024
作者: Kumar, Praveen Bagavathi Anandhan, E. Balamurugan, K. Gowreesh, A.M. Jayanth, N.J. Department of Cse Sri Eshwar College of Engineering Coimbatore India
The proposed system presents an all-encompassing solution for embedding data within images, while simultaneously maintaining their visual quality. This is achieved through the utilization of the Reversible Data Hiding... 详细信息
来源: 评论
Comparative Analysis of encryption Approaches for Mitigating IoT Network Attacks: Evaluating Performance and Security Metrics  1
Comparative Analysis of Encryption Approaches for Mitigating...
收藏 引用
1st International Conference on Innovations in Communications, Electrical and Computer Engineering, ICICEC 2024
作者: Lordwin Cecil Prabhakar, M. Suresh, P. Ram, Saravana Daisy Merina, R. Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology Department of Electronics and Communication Tamilnadu Chennai India Anna University Department of Electronics and Communication Regional Campus Tamilnadu Madurai India Vel Tech Multi Tech Dr. Rangarajan Dr. Sakunthala Engineering College Department of Computer Science and Engineering Chennai India
This paper focuses on various encryption approaches to cope with different network attacks on IoT devices and a quality analysis of them has been performed. Currently network attacks such as, IoT botnets, DNS threats,... 详细信息
来源: 评论
Selective encryption Algorithm for Vectoral Geographic Data under Feature Point Grouping Strategy
Selective Encryption Algorithm for Vectoral Geographic Data ...
收藏 引用
2024 Mid-term Symposium on Spatial Information to Empower the Metaverse
作者: Zhou, Qianwen Xiong, Ying Zhu, Changqing Ren, Na Nanjing Normal University Nanjing China Hunan Engineering Research Centre of Geographic Information Security and Application Changsha China
Selective encryption technology is a data security protection method that can balance encryption security and efficiency. Currently, there is ongoing research on applying this technology to vector geographic data. How... 详细信息
来源: 评论
Exploiting AES encryption Vulnerabilities Through Padding Oracle Attacks and Generative AI Techniques  8
Exploiting AES Encryption Vulnerabilities Through Padding Or...
收藏 引用
8th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC 2024
作者: Priya, L. Kapilamithran, S. Rajalakshmi Engineering College Department of Information Technology Chennai India
In the field of cybersecurity, the need for reliable encryption algorithm is vast. Advanced encryption Standard (AES) stands as a widely utilized cryptographic algorithm for securing sensitive data. In today's wor... 详细信息
来源: 评论
Application of Image Security Transmission encryption Algorithm Based on Chaos Algorithm in Networking Systems of Artificial Intelligence  3
Application of Image Security Transmission Encryption Algori...
收藏 引用
3rd International Conference on Networking Systems of AI, INSAI 2023
作者: Tian, Hongmei Yuan, Zhijie Zhou, Jiao He, Rui Xi'An University of Technology Xi'an China China Coal Technology & Engineering Group Xian Research Institute Xi'an China
This study focuses on enhancing the security of image transmission in Networking Systems of Artificial Intelligence (NSAI) by implementing an advanced encryption algorithm (AEA) based on chaotic algorithms. The resear... 详细信息
来源: 评论
An Image Scrambling encryption Algorithm Based on Combinatorial Chaos Mapping
An Image Scrambling Encryption Algorithm Based on Combinator...
收藏 引用
2023 International Conference on Evolutionary algorithms and Soft Computing Techniques, EASCT 2023
作者: Luo, Yuan Zhou, Ying Hou, Yongxu Ye, Jun School of Cyberspace Security Hainan University Key Laboratory of Internet Information Retrieval of Hainan Province Haikou China
With the development and application of network technology, digital images, as a form of information transmission, are at high risk of being stolen or decrypted. Our scheme utilizes the nature of low dimensional chaos... 详细信息
来源: 评论