咨询与建议

限定检索结果

文献类型

  • 280 篇 会议
  • 104 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 333 篇 工学
    • 284 篇 计算机科学与技术...
    • 135 篇 软件工程
    • 106 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 51 篇 网络空间安全
    • 31 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 15 篇 动力工程及工程热...
    • 13 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 135 篇 理学
    • 88 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 59 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
    • 4 篇 工商管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 9 篇 法学
    • 6 篇 社会学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 389 篇 encryption algor...
  • 17 篇 cryptography
  • 10 篇 security
  • 7 篇 cloud computing
  • 5 篇 elliptic curve c...
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 internet of thin...
  • 4 篇 iot
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 308 篇 英文
  • 78 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=Encryption algorithms"
389 条 记 录,以下是171-180 订阅
排序:
Minimized Computational Time in Cloud using Advanced encryption Standard Algorithm over File Changed with Security  2
Minimized Computational Time in Cloud using Advanced Encrypt...
收藏 引用
2nd IEEE International Conference on Advances in Information Technology, ICAIT 2024
作者: Jaswanth, Thavva Venkata Thangaraj, S. John Justin Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Tamil Nadu Chennai India
The goal is to reduce the amount of time spent on computations in cloud computing by employing the advanced encryption standard (AES) method rather than the file change with security (FCS) algorithm. sole data securit... 详细信息
来源: 评论
Enhancement of Security in IoT using Secure Hash Cryptography Algorithm with Double encryption (SHCA-DE)  9
Enhancement of Security in IoT using Secure Hash Cryptograph...
收藏 引用
9th International Conference on Communication and Electronics Systems, ICCES 2024
作者: Uganya, G. Rajalakshmi, D. Vangapandu, Ramarao Dinesh, M. Giri, Jayant Odeh, Mahmoud Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology Department of Ece Chennai India Srm Institute of Science and Technology Department of Data Science and Business Systems Kattankulathur Chennai India Vignan's Institute of Engineering for Women Department of Computer Science and Engineering Vishakhapatnam India Saveetha University Department of Vlsi Microelectronics Saveetha School of Engineering Chennai India Yeshwantrao Chavan College of Engineering Department of Mechanical Engineering Nagpur India Lovely Professional University Division of Research and Development Phagwara India Zarqa University Faculty of Information Technology Department of Cyber Security Zarqa Jordan University of Business and Technology Jeddah Saudi Arabia
The 'Internet of things' is the developing technology to transfer the world into smart innovation. 'IoT' security is the most problematic issue in recent applications due to its properties including &#... 详细信息
来源: 评论
Dynamic detection technology of encryption algorithm based on Pin  9
Dynamic detection technology of encryption algorithm based o...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Qu, Junpeng Du, Gaolei Sun, Yunge Fu, Yong Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250014 China Quan Cheng Laboratory Jinan250103 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
Aiming at the problem that malicious software uses encryption algorithm to hide its own malicious code and avoid detection, a dynamic detection technology based on Pin encryption algorithm is proposed. Use Pin to get ... 详细信息
来源: 评论
Privacy-Preserving Image Protection in Cloud Computing Using Intelligent encryption
Privacy-Preserving Image Protection in Cloud Computing Using...
收藏 引用
2024 OPJU International Technology Conference on Smart Computing for Innovation and Advancement in Industry 4.0, OTCON 2024
作者: Mohamoud, Asad Hassan Gupta, Ganesh Kumar, Anuj Sharda University Computer Science and Engineering Delhi India
Cloud computing have increased computing capabilities and open new horizons for computer science and communication but brought along challenges such as data protection, cloud computing uses information being sent over... 详细信息
来源: 评论
Medical Image encryption with Fractional Discrete Cosine Transform, Arnold Transform and AES
Medical Image Encryption with Fractional Discrete Cosine Tra...
收藏 引用
2024 IEEE Region 10 Conference, TENCON 2024
作者: Sundaram, Gaurav Shourya, Snehan Kumar, Ayush Jha, Rajib Kumar Maharana, Rashmi Ranjan Kumar, Sumit Indian Institute of Technology Patna Dept. of Electrical Engg. Patna India Parala Maharaja Engineering College Dept. of Ete Berhampur India
In this paper, we propose a novel encryption algorithm for medical images. Our algorithm is based around ad-vanced encryption standard (AES), however, its simple algebraic structure and the encryption process of every... 详细信息
来源: 评论
SECURE-LINK: Next Generation Algorithm for Data Integrity and encryption
SECURE-LINK: Next Generation Algorithm for Data Integrity an...
收藏 引用
2024 Asia Pacific Conference on Innovation in Technology, APCIT 2024
作者: Shriramoj, Om Brahma Kaur, Inderdeep Yadav, Aniket Thakur, Raushan Kumar Raj, Ritik Yadav, Anup Chandigarh University Computer Science and Engineering Mohali India
This paper suggests a new way of encrypting data that uses math problems and a special code from ECC to make it harder to break. The idea is to use a type of encryption that makes it hard to break by using the propert... 详细信息
来源: 评论
An Optimized Implementation of the Blowfish encryption Algorithm
An Optimized Implementation of the Blowfish Encryption Algor...
收藏 引用
2024 International Telecommunications Conference, ITC-Egypt 2024
作者: Zied, Hamed Shawky Abdellatif, Ahmed Gamal Elmahallawy, Adham Ahmed Air Defence Collage Department of Electronics and Electrical Communications Engineering Alexandria Egypt Higher institute of Engineering and Technology King Mariout Alexandria Egypt
In recent times, there has been a notable prolif-eration in the utilization and acceptance of encryption algorithms. However, the predominant focus within this field has revolved around the optimization and refinement... 详细信息
来源: 评论
Enhancing Security: A Hybrid encryption Algorithm for Effective Key Generation  2
Enhancing Security: A Hybrid Encryption Algorithm for Effect...
收藏 引用
2nd International Conference on Recent Trends in Microelectronics, Automation, Computing, and Communications Systems, ICMACC 2024
作者: Jacob, Jeevan John Kiran, P.S. Shenoy, Jaigovind B Basavaraju, Sagar Amrita School of Computing Department of Computer Science and Engineering Bengaluru India Amrita School of Engineering Department of Electronics and Communication Engineering Bengaluru India
The abstract Data security is of most importance, in the present day- the introduction of high-level wireless communication channels has led to generation and transfer of massive amounts of data. Data security must ke... 详细信息
来源: 评论
An Algorithm for Image encryption Combining the Lorenz System, XOR Operation, and Inverted Bit Permutation  3
An Algorithm for Image Encryption Combining the Lorenz Syste...
收藏 引用
3rd International Conference on Embedded Systems and Artificial Intelligence, ESAI 2024
作者: Koulouh, Fatima Amine, Safae Taouil, Rafik Es-Sabry, Mohammed Hdioud, Ferdaous Akkad, Nabil El ENSAF USMBA LASET Laboratory Fez Morocco ENSAF LASET Laboratory Fez Morocco University of Abdelmalek Essaadi ECT FS Tetouan Morocco University of Abdelmalek Essaadi ISISAFS Tetouan Morocco EST USMBA Fez Morocco LASET Laboratory ENSAF Fez Morocco
This paper proposes a new image encoding algorithm that integrates inverted bit permutation with the chaotic behavior of a hybrid Lorenz chaotic system and XOR operation. The method capitalizes on the inherent of the ... 详细信息
来源: 评论
An Enhanced Vigenère encryption Algorithm using 6S-Substitution and 2S-Transposition Technique
An Enhanced Vigenère Encryption Algorithm using 6S-Substitu...
收藏 引用
2024 IEEE International Conference on Data and Software Engineering, ICoDSE 2024
作者: Galeza, Sugar Mae T. Sison, Ariel M. Medina, Ruji P. Graduate Program Technological Institute of the Philippines Quezon City Philippines School of Computer Studies Emilio Aguinaldo College Manila Philippines
Vigenère encryption algorithm is a classical cryptographic algorithm featuring a polyalphabetic stream cipher, which as numerous limitations pertaining to finding the size and length of the encryption key. This s... 详细信息
来源: 评论