咨询与建议

限定检索结果

文献类型

  • 280 篇 会议
  • 104 篇 期刊文献
  • 4 篇 学位论文
  • 1 册 图书

馆藏范围

  • 389 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 333 篇 工学
    • 284 篇 计算机科学与技术...
    • 135 篇 软件工程
    • 106 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 84 篇 电气工程
    • 51 篇 网络空间安全
    • 31 篇 电子科学与技术(可...
    • 25 篇 机械工程
    • 24 篇 石油与天然气工程
    • 23 篇 交通运输工程
    • 23 篇 安全科学与工程
    • 15 篇 动力工程及工程热...
    • 13 篇 仪器科学与技术
    • 7 篇 化学工程与技术
    • 5 篇 材料科学与工程(可...
    • 5 篇 环境科学与工程(可...
    • 4 篇 航空宇航科学与技...
  • 135 篇 理学
    • 88 篇 数学
    • 41 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 14 篇 化学
    • 11 篇 系统科学
  • 59 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 公共管理
    • 4 篇 工商管理
  • 15 篇 医学
    • 11 篇 公共卫生与预防医...
    • 5 篇 临床医学
  • 9 篇 法学
    • 6 篇 社会学
  • 4 篇 教育学
  • 4 篇 文学
    • 4 篇 新闻传播学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 389 篇 encryption algor...
  • 17 篇 cryptography
  • 10 篇 security
  • 7 篇 cloud computing
  • 5 篇 elliptic curve c...
  • 5 篇 aes
  • 5 篇 encryption
  • 4 篇 internet of thin...
  • 4 篇 iot
  • 4 篇 rsa
  • 3 篇 decryption algor...
  • 3 篇 block cipher
  • 3 篇 cryptanalysis
  • 3 篇 ecc
  • 3 篇 information secu...
  • 3 篇 blockchain
  • 3 篇 des
  • 3 篇 cloud security
  • 3 篇 chaos
  • 3 篇 blowfish

机构

  • 4 篇 school of comput...
  • 3 篇 karnataka bangal...
  • 3 篇 department of co...
  • 3 篇 maharishi school...
  • 3 篇 brno university ...
  • 2 篇 department of me...
  • 2 篇 emilio aguinaldo...
  • 2 篇 v. n. karazin kh...
  • 2 篇 business school ...
  • 2 篇 technological in...
  • 2 篇 beijing electron...
  • 2 篇 shanwei institut...
  • 2 篇 tei western gree...
  • 2 篇 g.e. pukhov inst...
  • 2 篇 rajalakshmi engi...
  • 2 篇 saveetha institu...
  • 2 篇 school of comput...
  • 2 篇 the university o...
  • 2 篇 shandong fundame...
  • 2 篇 karnataka bengal...

作者

  • 3 篇 lutsenko vladisl...
  • 3 篇 ye jun
  • 3 篇 medina ruji p.
  • 3 篇 sison ariel m.
  • 3 篇 thangaraj s. joh...
  • 2 篇 wang chunpeng
  • 2 篇 carlson albert
  • 2 篇 alomari mohammad...
  • 2 篇 sun yunge
  • 2 篇 gabr mohamed
  • 2 篇 kudo momonari
  • 2 篇 adamek janis
  • 2 篇 faisal
  • 2 篇 ramli abdul rahm...
  • 2 篇 binfet philipp
  • 2 篇 qu junpeng
  • 2 篇 petropoulos ch.
  • 2 篇 chovanec martin
  • 2 篇 samsudin khairul...
  • 2 篇 rozlomii inna

语言

  • 308 篇 英文
  • 78 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"主题词=Encryption algorithms"
389 条 记 录,以下是191-200 订阅
排序:
Xerox :: Parc :: Techreports :: Csl-78-4 Using encryption for Authentication in Large Networks of Computers
收藏 引用
2016年
Xerox :: Parc :: Techreports :: Csl-78-4 Using encryption for Authentication in Large Networks of Computers by published by
来源: 评论
Construction of resilient S-boxes with higher-dimensional vectorial outputs and strictly almost optimal non-linearity
收藏 引用
IET INFORMATION SECURITY 2017年 第4期11卷 199-203页
作者: Zhang, WeiGuo Li, LuYang Pasalic, Enes Xidian Univ ISN Lab Xian 710071 Peoples R China State Key Lab Cryptol POB 5159 Beijing 100878 Peoples R China Univ Primorska Fac Math Nat Sci & Informat Technol Koper 6000 Slovenia Inst Andrej Marusic Koper 6000 Slovenia
Resilient substitution boxes (S-boxes) with high non-linearity are important cryptographic primitives in the design of certain encryption algorithms. There are several trade-offs between the most important cryptograph... 详细信息
来源: 评论
Flexible structures of lightweight block ciphers PRESENT, SIMON and LED
收藏 引用
IET CIRCUITS DEVICES & SYSTEMS 2020年 第3期14卷 369-380页
作者: Rashidi, Bahram Ayatollah Boroujerdi Univ Dept Elect Engn Boroujerd *** Iran
Security and privacy of the Internet of Things (IoT) systems are critical challenges in many data-sensitive applications. The IoT systems are constrained in terms of execution time, flexibility and computational resou... 详细信息
来源: 评论
A Method for Optimal Value Measurement of Some Parameters of Fault Attacks on Cryptographic algorithms
收藏 引用
Journal of Applied and Industrial Mathematics 2024年 第2期18卷 371-377页
作者: Zuev, Yu. A. Klyucharev, P.G. Bauman Moscow State Technical University Moscow105005 Russia
Abstract: This paper is devoted to the construction of a time-optimal method for measuring themaximum permissible (critical) value of the supply voltage (as well as other parameters) of thedevice on which the cryptogr... 详细信息
来源: 评论
Computational Approach for Securing Radiology-Diagnostic Data in Connected Health Network using High-Performance GPU-Accelerated AES
收藏 引用
INTERDISCIPLINARY SCIENCES-COMPUTATIONAL LIFE SCIENCES 2017年 第1期9卷 140-152页
作者: Adeshina, A. M. Hashim, R. Univ Tun Hussein Onn Malaysia Fac Comp Sci & Informat Technol Batu Pahat 86400 Johor Malaysia
Diagnostic radiology is a core and integral part of modern medicine, paving ways for the primary care physicians in the disease diagnoses, treatments and therapy managements. Obviously, all recent standard healthcare ... 详细信息
来源: 评论
A Blockchain Technology: Analysis of a Secure Payment Mode for Enterprise E-Commerce Import and Export Trade
收藏 引用
International Journal of Network Security 2024年 第5期26卷 861-866页
作者: Dong, Xianfeng Li, Jing Henan Mechanical & Electrical Vocational College Henan Zhengzhou451151 China
This paper briefly introduces the payment mode of e-commerce import and export trade based on blockchain. In this mode, the blockchain is utilized to store transaction information, while the Bresson, Catalano, and Poi... 详细信息
来源: 评论
Image encryption algorithm based on hyperchaotic system and dynamic DNA encoding
收藏 引用
PHYSICA SCRIPTA 2023年 第11期98卷 115215-115215页
作者: Liang, Wuyan Zhang, Limin Yang, Zhongbao Yu, Tingting Li, Jingjing Li, Xianli Northeast Petr Univ Coll Phys & Elect Engn 99 Xuefu St Daqing 163318 Peoples R China
Since the existing DNA encryption algorithms only have fixed DNA coding and decoding rules and a single algorithm that cannot meet more complex and more secure encryption requirements, an image encryption algorithm ba... 详细信息
来源: 评论
An efficient multimedia compression-encryption scheme using latin squares for securing internet of things networks
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2022年 64卷
作者: El-Shafai, Walid Mesrega, Ahmed K. Ahmed, Hossam Eldin Abdelwahab, Nermin Abd El-Samie, Fathi E. Menoufia Univ Fac Elect Engn Dept Elect & Elect Commun Engn Menoufia Egypt Prince Sultan Univ Comp Sci Dept Secur Engn Lab Riyadh 11586 Saudi Arabia Menoufia Univ Fac Elect Engn Dept Comp Sci & Engn Menoufia Egypt Princess Nourah Bint Abdulrahman Univ Coll Comp & Informat Sci Dept Informat Technol Riyadh 84428 Saudi Arabia
The security of multimedia data and its applications has become a building block of any digital communication technology. The extensive use of multimedia content over wireless networks makes the applications exposed t... 详细信息
来源: 评论
Cryptographic Cloud Computing Environment as a More Trusted Communication Environment
收藏 引用
INTERNATIONAL JOURNAL OF GRID AND HIGH PERFORMANCE COMPUTING 2014年 第2期6卷 38-51页
作者: Jasim, Omer K. Abbas, Safia El-Horbaty, El-Sayed M. Salem, Abdel-Badeeh M. Almaarif Univ Coll Dept Comp Sci Anbar Iraq Ain Shams Univ Cairo Egypt Ain Shams Univ Fac Comp & Informat Sci Dept Comp Sci Cairo Egypt Ajman Univ Fac IT Ajman U Arab Emirates Ain Shams Univ Fac Comp & Informat Sci Ctr Comp Sci Comp Sci Cairo Egypt
Cloud Communication Environment is an internet-based computing, where shared resources, software, and information are provided with computers and devices on-demand. They guarantee a way to share distributed resources ... 详细信息
来源: 评论
Performance of Data Images encryption Based Karhunen-Leoeve Transforms
收藏 引用
Research Journal of Applied Sciences, Engineering and Technology 2017年 第3期14卷 95-100页
作者: Hind Rustum Mohammed Shaban Inaam R. Alsaiq Alaa Abdul Hussein Mezher Computer Science Department Mathmatics Department Faculty of Computer Science and Maths Kufa University Najaf 54001 Iraq
The purpose of this study encryption method will apply on all parts image by the Karhunen-Loeve Transform (KLT). It will be discussed time complexity and storage complexity in method (database consists of 40 images). ... 详细信息
来源: 评论