咨询与建议

限定检索结果

文献类型

  • 280 篇 会议
  • 104 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 333 篇 工学
    • 284 篇 计算机科学与技术...
    • 135 篇 软件工程
    • 106 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 51 篇 网络空间安全
    • 31 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 15 篇 动力工程及工程热...
    • 13 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 135 篇 理学
    • 88 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 59 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
    • 4 篇 工商管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 9 篇 法学
    • 6 篇 社会学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 389 篇 encryption algor...
  • 17 篇 cryptography
  • 10 篇 security
  • 7 篇 cloud computing
  • 5 篇 elliptic curve c...
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 internet of thin...
  • 4 篇 iot
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 308 篇 英文
  • 78 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=Encryption algorithms"
389 条 记 录,以下是11-20 订阅
排序:
Power Consumption Modelling for Symmetric Block encryption algorithms
Power Consumption Modelling for Symmetric Block Encryption A...
收藏 引用
International Conference on Current Problems of Applied Mathematics and Computer Systems, CPAMCS 2023
作者: Maro, Ekaterina Southern Federal University Taganrog Russia
The modeling of side channel leaks of power consumption during executing cryptographic algorithms is one of the perspective research areas in the field of security of cyber-physical systems. The use of algorithmically... 详细信息
来源: 评论
Securing the Quantum Future: Evaluating and Standardizing Quantum encryption algorithms  15
Securing the Quantum Future: Evaluating and Standardizing Qu...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Soumya, S. Chithralekha, T. Department of Computer Science Pondicherry University Puducherry India
The rise of quantum computing poses a grave threat to current cryptographic methods. While Quantum Key Distribution (QKD) offers a potential solution, guaranteeing its security in real-world implementations remains ch... 详细信息
来源: 评论
Performance analysis of symmetric encryption algorithms for time-critical cybersecurity application
Performance analysis of symmetric encryption algorithms for ...
收藏 引用
2024 Cybersecurity Providing in Information and Telecommunication Systems II, CPITS-II 2024
作者: Kuznetsov, Oleksandr Kuznetsova, Yelyzaveta Frontoni, Emanuele Arnesano, Marco Smirnov, Oleksii Campus University 10 Via Isimbardi Novedrate22060 Italy V. N. Karazin Kharkiv National University 4 Svobody sq. Kharkiv61022 Ukraine University of Macerata 30/32 Via Crescimbeni Macerata62100 Italy Central Ukrainian National Technical University 8 University ave. Kropyvnytskyi25006 Ukraine
This study presents a comprehensive performance analysis of symmetric encryption algorithms in the context of time-critical cybersecurity applications. We evaluate a diverse set of algorithms, including established st... 详细信息
来源: 评论
Using Quantum Resistant Variants of NIST IR 8454 Lightweight encryption algorithms in Image encryption  8
Using Quantum Resistant Variants of NIST IR 8454 Lightweight...
收藏 引用
8th International Artificial Intelligence and Data Processing Symposium, IDAP 2024
作者: Kaya, Muhammed Saadetdin Iince, Kenan Ankara University Cyber Security Vocational School Ankara Turkey Inonu University Software Engineering Malatya Turkey
This work examines the potential of quantum resistant variants of NIST IR 8454 lightweight encryption algorithms in the field of image encryption. Selected algorithms from ASCON, TinyJAMBU and SPARKLE families were an... 详细信息
来源: 评论
Automated Detection of encryption algorithms Using AI Techniques  5
Automated Detection of Encryption Algorithms Using AI Techni...
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent Systems, ICICNIS 2024
作者: Chidambaranathan, Senthilnathan Santhanaraj, M. Ajitha, E. Syed Fiaz, A.S. Suchithra, B. Kathirvel, T. Virtusa Corporation NJ United States Kongunadu College of Engineering and Technology Department of IT Tamil Nadu Trichy India St. Joseph's Institute of Technology Computer Science and Engineering India Sona College of Technology Department of Information Technology Salem India Sri Eshwar College of Engineering Department of CSE Coimbatore India
In today's digital era, cryptographic algorithms play a vital role in safeguarding sensitive information, maintaining confidentiality, and defending against cyberattacks. With the growing variety of encryption met... 详细信息
来源: 评论
RESEARCH ON PRIVACY DATA SECURITY PROTECTION IN SENSOR NETWORKS USING encryption algorithms
UPB Scientific Bulletin, Series C: Electrical Engineering an...
收藏 引用
UPB Scientific Bulletin, Series C: Electrical Engineering and Computer Science 2024年 第3期86卷 25-34页
作者: Yao, Yunxia Peng, Renjie Mi, Wenli School of Mathematics and Information Engineering Longdong University Gansu Qingyang745000 China School of Intelligent Manufacturing Longdong University Gansu Qingyang745000 China
This paper briefly introduces wireless sensor networks (WSNs) and proposes an enhancement to a block encryption algorithm using chaotic mapping principles. The proposed encryption algorithm was tested on an establishe... 详细信息
来源: 评论
Post-quantum encryption algorithms of high-degree 3-variable polynomial congruences: BS cryptosystems and BS key generation
arXiv
收藏 引用
arXiv 2024年
作者: Daras, Nicholas J. Hellenic Military Academy Department of Mathematics and Engineering Sciences Vari Attikis16673 Greece
We will construct post-quantum encryption algorithms based on three-variable polynomial Beal-Schur congruence. After giving a proof of Beal's conjecture and citing some applications of it to selected cases where t... 详细信息
来源: 评论
Robust pixel-level image encryption algorithm using 3D infinite collapse coupling map
收藏 引用
Multimedia Tools and Applications 2025年 1-24页
作者: Song, Okchol Pak, Chanil Jong, Cholmin Erkan, Ugur Ri, Myongsong Institute of Information Technology Kim Chaek University of Technology Sungri Street Asia Pyongyang950003 Korea People's Democratic Rep Department of Computer Engineering Karamanoglu Mehmetbey University Karaman70200 Turkey
Chaotic map, due to its excellent unpredictability and complexity, is widely used in various fields, such as information security, information communication, and system control, etc., thus research work is being inten... 详细信息
来源: 评论
A new fast multiple color image encryption algorithm
收藏 引用
Cluster Computing 2025年 第5期28卷 1-34页
作者: Alexan, Wassim Hosny, Khalid Gabr, Mohamed Cairo Governorate11853 Egypt Department of Information Technology Zagazig University Zagazig44511 Egypt Cairo Governorate11853 Egypt
This article proposes a novel multiple-image encryption algorithm (MIEA) that utilizes parallel processing. The proposed MIEA combines multiple plain images, forming a plain image cube. The proposed MIEA is based on t... 详细信息
来源: 评论
PALCT: vehicle-to-vehicle communication based on pseudonym assignment and encryption scheme using delay minimisation cover tree algorithm
收藏 引用
International Journal of Vehicle Information and Communication Systems 2025年 第2期10卷 132-147页
作者: Tandon, Righa Gupta, P.K. Chitkara University Institute of Engineering and Technology Chitkara University Punjab India Department of Computer Science and Engineering Jaypee University of Information Technology HP Solan173 234 India Department of Data Science School of Computing Mohan Babu University AP Tirupati517 102 India
Vehicle-to-vehicle communication is one of the new paradigms of networking, which should be secure, fast, and efficient. In this paper, we propose a framework that implements the pseudonym-based authentication scheme ... 详细信息
来源: 评论