咨询与建议

限定检索结果

文献类型

  • 280 篇 会议
  • 104 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 333 篇 工学
    • 284 篇 计算机科学与技术...
    • 135 篇 软件工程
    • 106 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 51 篇 网络空间安全
    • 31 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 15 篇 动力工程及工程热...
    • 13 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 135 篇 理学
    • 88 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 59 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
    • 4 篇 工商管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 9 篇 法学
    • 6 篇 社会学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 389 篇 encryption algor...
  • 17 篇 cryptography
  • 10 篇 security
  • 7 篇 cloud computing
  • 5 篇 elliptic curve c...
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 internet of thin...
  • 4 篇 iot
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 308 篇 英文
  • 78 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=Encryption algorithms"
389 条 记 录,以下是141-150 订阅
排序:
AI Powered Crypt-Analysis for Identification of encryption Algorithm  4
AI Powered Crypt-Analysis for Identification of Encryption A...
收藏 引用
4th International Conference on Sustainable Expert Systems, ICSES 2024
作者: Radhika, K. Verma, Shanti Sathya, R. Kathirvel, T. Vishnu, K.Harish Rajan, N.Mukesh Kongu Engineering College Department of Mathematics Perundurai India Lokmanya Institute of management and computer applications Gujarat Technological University Ahmedabad India Kongunadu College of Engineering and Technology Tamil Nadu Trichy India
In modern world, cryptographic algorithms are critical for securing sensitive data, ensuring confidentiality, and protecting against cyber threats. With the increasing number of encryption algorithms and modes, identi... 详细信息
来源: 评论
Limits of Black-Box Anamorphic encryption  44th
Limits of Black-Box Anamorphic Encryption
收藏 引用
44th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO)
作者: Catalano, Dario Giunta, Emanuele Migliaro, Francesco Univ Catania Dipartimento Matemat & Informat Catania Italy IMDEA Software Inst Madrid Spain Univ Politecn Madrid Madrid Spain
(Receiver) Anamorphic encryption, introduced by Persiano et al. at Eurocrypt 2022, considers the question of achieving private communication in a world where secret decryption keys are under the control of a dictator.... 详细信息
来源: 评论
Linear encryption Techniques for Counteracting Information-based Stealthy Attacks  18
Linear Encryption Techniques for Counteracting Information-b...
收藏 引用
18th International Conference on Control Automation Robotics and Vision
作者: Shang, Jun Zhang, Hanwen Rao, Weixiong Hong, Yiguang Tongji Univ Frontiers Sci Ctr Intelligent Autonomous Syst Shanghai Inst Intelligent Sci & Technol Natl Key Lab Autonomous Intelligent Unmanned Syst Shanghai 200092 Peoples R China Tongji Univ Dept Control Sci & Engn Shanghai 200092 Peoples R China Univ Sci & Technol Beijing Sch Automat & Elect Engn Key Lab Knowledge Automat Ind Proc Minist Educ Beijing 100083 Peoples R China Tongji Univ Sch Software Engn Shanghai 200070 Peoples R China
This study explores linear encryption techniques to protect against information-based stealthy attacks on remote state estimation. Utilizing smart sensors equipped with local Kalman filters, the system transmits innov... 详细信息
来源: 评论
Design of Light-weight encryption Algorithm Based on RISC-V Platform  35
Design of Light-weight Encryption Algorithm Based on RISC-V ...
收藏 引用
35th IEEE International Conference on Application-Specific Systems, Architectures and Processors (ASAP)
作者: Zhang, Zekai Cheung, Ray Chak Chung City Univ Hong Kong Hong Kong Peoples R China
In this work, we aim to design a lightweight encryption algorithm, GIFT, suitable for IoT systems. The design concept of the GIFT lightweight encryption algorithm is based on the PRESENT lightweight encryption algorit... 详细信息
来源: 评论
The Spatial Data Sharing Security Model Based on Hybrid encryption Algorithm
The Spatial Data Sharing Security Model Based on Hybrid Encr...
收藏 引用
International Symposium on Artificial Intelligence and Robotics
作者: Wang, Di Lva, Yanli Chen, Yuxi Yang, Ruxia State Grid Corp China Big Data Ctr Beijing Peoples R China Global Energy Interconnect Res Inst Co Ltd Nanjing Peoples R China State Grid Key Lab Informat & Network Secur Nanjing Peoples R China
Hybrid encryption algorithms are flexible tools for modeling the correlation of random variables. They cover the scope from completely negative correlation to positive correlation, including independent cases and cont... 详细信息
来源: 评论
AI-based encryption system for secure UAV communication  7
AI-based encryption system for secure UAV communication
收藏 引用
7th IEEE International Conference on Actual Problems of Unmanned Aerial Vehicles Development, APUAVD 2024
作者: Gnatyuk, Sergiy Okhrimenko, Tetiana Proskurin, Dmytro National Aviation University Faculty of Computer Science and Technology Kyiv Ukraine
As digital communication systems become increasingly complex, the need for robust and efficient cryptographic solutions has never been more critical. Traditional methods of selecting encryption algorithms and ensuring... 详细信息
来源: 评论
On Multi-Key FuncCPA Secure encryption Schemes  1
On Multi-Key FuncCPA Secure Encryption Schemes
收藏 引用
1st International Conference on Cryptography and Information Security, VCRIS 2024
作者: Nakajima, Eri Hara, Keisuke Yamashita, Kyosuke Osaka University Department of Information and Computer Sciences Osaka Japan National Institute of Advanced Industrial Science and Technology Cyber Physical Security Research Center Tokyo Japan Yokohama National University Kanagawa Japan
The notion of funcCPA security for homomorphic encryption schemes was introduced by Akavia et al. (TCC 2022). Whereas it aims to capture the bootstrapping technique in homomorphic encryption schemes, Dodis et al. (TCC... 详细信息
来源: 评论
Secured Multi-Platform Communication Application Using Advanced encryption Standard Algorithm  10
Secured Multi-Platform Communication Application Using Advan...
收藏 引用
10th International Conference on Advanced Computing and Communication Systems, ICACCS 2024
作者: Bhatt, Chandradeep Tiwari, Chirag Thalal, Bhupesh Singh Vishnoi, Arpit Joshi, Karan Singh, Teekam Graphic Era Hill University Cse Department Dehradun India Computer Science and Engineering Graphic Era Hill University Dehradun India Computer Science and Engineering Graphic Era Deemed to be University Dehradun India
Messaging applications have been a common tool used by individuals as smartphones gain popularity and provide a larger range of application functions. An instant messaging program with text messaging capabilities is a... 详细信息
来源: 评论
Advanced data encryption method based on the monochrome pixel alphabet  4
Advanced data encryption method based on the monochrome pixe...
收藏 引用
4th International Workshop on Information Technologies: Theoretical and Applied Problems, ITTAP 2024
作者: Trysnyuk, Vasyl Smetanin, Kyrylo Humeniuk, Ihor Lahodnyi, Oleksandr Okhrimchuk, Volodymyr Institute of Telecommunications and Global Information Space The National Academy of Sciences of Ukraine 13 Chokolivsky Blvd. Kyiv02000 Ukraine Korolov Zhytomyr Military Institute 22 Miru Ave. Zhytomyr10004 Ukraine
Results of the encryption methods analysis showed, that modern approaches only consider the cryptographic and steganographic properties of data protection algorithms and do not provide the proper level of information ... 详细信息
来源: 评论
encryption upgrade method for vehicle terminal firmware based on improved AES algorithm  4
Encryption upgrade method for vehicle terminal firmware base...
收藏 引用
4th International Conference on Electronic Information Engineering and Computer Communication, EIECC 2024
作者: Zhang, Zhiwei Zheng, Gang Shanghai Institute of Technology School of Mechanical Engineering Shanghai China
With the rapid popularization of intelligent vehicles, the security of vehicle terminal firmware in the process of remote upgrade is becoming more and more important. To this end, two improvement measures are proposed... 详细信息
来源: 评论